{"id":"https://openalex.org/W3133366149","doi":"https://doi.org/10.3233/jcs-200036","title":"A permission-dependent type system for secure information flow analysis","display_name":"A permission-dependent type system for secure information flow analysis","publication_year":2021,"publication_date":"2021-02-17","ids":{"openalex":"https://openalex.org/W3133366149","doi":"https://doi.org/10.3233/jcs-200036","mag":"3133366149"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-200036","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200036","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089943764","display_name":"Zhiwu Xu","orcid":"https://orcid.org/0000-0001-6727-440X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwu Xu","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, China. E-mail:\u00a0","College of Computer Science and Software Engineering, Shenzhen University, China. E-mail:\u00a0xuzhiwu@szu.edu.cn"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, China. E-mail:\u00a0","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, China. E-mail:\u00a0xuzhiwu@szu.edu.cn","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107243315","display_name":"Hongxu Chen","orcid":"https://orcid.org/0000-0001-7983-2544"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hongxu Chen","raw_affiliation_strings":["Nanyang Technological University, Singapore. E-mails:\u00a0,\u00a0","Nanyang Technological University, Singapore. E-mails:\u00a0hongxu.chen@ntu.edu.sg,\u00a0yangliu@ntu.edu.sg"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore. E-mails:\u00a0hongxu.chen@ntu.edu.sg,\u00a0yangliu@ntu.edu.sg","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071064651","display_name":"Alwen Tiu","orcid":"https://orcid.org/0000-0002-2695-5636"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Alwen Tiu","raw_affiliation_strings":["The Australian National University, Australia. E-mails:\u00a0,\u00a0","The Australian National University, Australia. E-mails:\u00a0alwen.tiu@anu.edu.au,\u00a0kunal.sareen@anu.edu.au"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Australia. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I118347636"]},{"raw_affiliation_string":"The Australian National University, Australia. E-mails:\u00a0alwen.tiu@anu.edu.au,\u00a0kunal.sareen@anu.edu.au","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355692","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0001-7300-9215"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Nanyang Technological University, Singapore. E-mails:\u00a0,\u00a0","Nanyang Technological University, Singapore. E-mails:\u00a0hongxu.chen@ntu.edu.sg,\u00a0yangliu@ntu.edu.sg"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Nanyang Technological University, Singapore. E-mails:\u00a0hongxu.chen@ntu.edu.sg,\u00a0yangliu@ntu.edu.sg","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074610267","display_name":"Kunal Sareen","orcid":"https://orcid.org/0000-0003-0824-2920"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Kunal Sareen","raw_affiliation_strings":["The Australian National University, Australia. E-mails:\u00a0,\u00a0","The Australian National University, Australia. E-mails:\u00a0alwen.tiu@anu.edu.au,\u00a0kunal.sareen@anu.edu.au"],"affiliations":[{"raw_affiliation_string":"The Australian National University, Australia. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I118347636"]},{"raw_affiliation_string":"The Australian National University, Australia. E-mails:\u00a0alwen.tiu@anu.edu.au,\u00a0kunal.sareen@anu.edu.au","institution_ids":["https://openalex.org/I118347636"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089943764"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.1539,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.40131535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"29","issue":"2","first_page":"161","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772214412689209},{"id":"https://openalex.org/keywords/type-inference","display_name":"Type inference","score":0.7323905229568481},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.7229770421981812},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7014672756195068},{"id":"https://openalex.org/keywords/type-theory","display_name":"Type theory","score":0.5675234794616699},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5093944668769836},{"id":"https://openalex.org/keywords/binary-decision-diagram","display_name":"Binary decision diagram","score":0.49267321825027466},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.46961694955825806},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.45313164591789246},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4197234511375427},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4057651162147522},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33526498079299927},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.31580686569213867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31249192357063293},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.2644433379173279},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12968575954437256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772214412689209},{"id":"https://openalex.org/C198370458","wikidata":"https://www.wikidata.org/wiki/Q586459","display_name":"Type inference","level":3,"score":0.7323905229568481},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.7229770421981812},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7014672756195068},{"id":"https://openalex.org/C93682546","wikidata":"https://www.wikidata.org/wiki/Q1056428","display_name":"Type theory","level":3,"score":0.5675234794616699},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5093944668769836},{"id":"https://openalex.org/C3309909","wikidata":"https://www.wikidata.org/wiki/Q864155","display_name":"Binary decision diagram","level":2,"score":0.49267321825027466},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.46961694955825806},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.45313164591789246},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4197234511375427},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4057651162147522},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33526498079299927},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.31580686569213867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31249192357063293},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.2644433379173279},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12968575954437256},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-200036","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-200036","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/307625","is_oa":false,"landing_page_url":"http://hdl.handle.net/1885/307625","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security","raw_type":"Journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W153174126","https://openalex.org/W1461884856","https://openalex.org/W1557561422","https://openalex.org/W1750915279","https://openalex.org/W1963971515","https://openalex.org/W1973336874","https://openalex.org/W1977764760","https://openalex.org/W1994588724","https://openalex.org/W1998003182","https://openalex.org/W2017025011","https://openalex.org/W2025699392","https://openalex.org/W2027538101","https://openalex.org/W2038173123","https://openalex.org/W2060710422","https://openalex.org/W2075849836","https://openalex.org/W2077202047","https://openalex.org/W2080267935","https://openalex.org/W2088923183","https://openalex.org/W2094835181","https://openalex.org/W2094873755","https://openalex.org/W2101834106","https://openalex.org/W2102917576","https://openalex.org/W2108887121","https://openalex.org/W2115270921","https://openalex.org/W2116469687","https://openalex.org/W2117723002","https://openalex.org/W2122049982","https://openalex.org/W2128932642","https://openalex.org/W2129278597","https://openalex.org/W2147778310","https://openalex.org/W2148397566","https://openalex.org/W2149465027","https://openalex.org/W2150174204","https://openalex.org/W2166743230","https://openalex.org/W2248189341","https://openalex.org/W2265652392","https://openalex.org/W2295217343","https://openalex.org/W2295923951","https://openalex.org/W2346134553","https://openalex.org/W2533311740","https://openalex.org/W2534494087","https://openalex.org/W2752853835","https://openalex.org/W2760684713","https://openalex.org/W2898321088","https://openalex.org/W2912640545","https://openalex.org/W2963413731","https://openalex.org/W4241108170","https://openalex.org/W4243963980","https://openalex.org/W4244726870","https://openalex.org/W4245027182","https://openalex.org/W4247198503","https://openalex.org/W6633749307"],"related_works":["https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W3094039898","https://openalex.org/W3130884665","https://openalex.org/W2151761340","https://openalex.org/W2949482260","https://openalex.org/W1555133226","https://openalex.org/W2173238669","https://openalex.org/W4296000674","https://openalex.org/W2130339907"],"abstract_inverted_index":{"We":[0,62],"introduce":[1],"a":[2,36,66,94,106,151,163],"novel":[3,87],"type":[4,38,67,91,124,133,143],"system":[5,39,68,92,125],"for":[6,97,139],"enforcing":[7],"secure":[8],"information":[9,26],"flow":[10],"in":[11,28,59,155],"an":[12],"imperative":[13],"language.":[14],"Our":[15],"work":[16],"is":[17,93,126,136,177],"motivated":[18],"by":[19,69,101,145],"the":[20,45,60,81,84,140,147,156],"problem":[21,149,154],"of":[22,83,89,122,158],"statically":[23,48],"checking":[24],"potential":[25],"leakage":[27],"Android":[29,41],"applications.":[30,61,85],"To":[31],"this":[32],"end,":[33],"we":[34],"design":[35],"lightweight":[37],"featuring":[40],"permission":[42,102],"model,":[43],"where":[44],"permissions":[46,82],"are":[47,53],"assigned":[49],"to":[50,55,73,77,117,130,150,166],"applications":[51],"and":[52,71],"used":[54],"enforce":[56],"access":[57],"control":[58],"take":[63],"inspiration":[64],"from":[65],"Banerjee":[70],"Naumann":[72],"allow":[74],"security":[75,110,115,142,159,169],"types":[76,170],"be":[78,118],"dependent":[79],"on":[80,109],"A":[86,132],"feature":[88],"our":[90,123,168],"typing":[95],"rule":[96],"conditional":[98],"branching":[99],"induced":[100],"testing,":[103],"which":[104],"introduces":[105],"merging":[107],"operator":[108],"types,":[111],"allowing":[112],"more":[113],"precise":[114],"policies":[116],"enforced.":[119],"The":[120],"soundness":[121],"proved":[127],"with":[128],"respect":[129],"non-interference.":[131],"inference":[134,148],"algorithm":[135],"also":[137],"presented":[138],"underlying":[141],"system,":[144],"reducing":[146],"constraint":[152],"solving":[153],"lattice":[157],"types.":[160],"In":[161],"addition,":[162],"new":[164],"way":[165],"represent":[167],"as":[171],"reduced":[172],"ordered":[173],"binary":[174],"decision":[175],"diagrams":[176],"proposed.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
