Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker throug...
Saved in:
| Published in: | IEEE journal on selected areas in communications Vol. 21; no. 1; pp. 5 - 19 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
IEEE
01.01.2003
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 0733-8716, 1558-0008 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges. |
|---|---|
| AbstractList | Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges. |
| Author | Sabelfeld, A. Myers, A.C. |
| Author_xml | – sequence: 1 givenname: A. surname: Sabelfeld fullname: Sabelfeld, A. organization: Comput. Sci. Dept., Cornell Univ., Ithaca, NY, USA – sequence: 2 givenname: A.C. surname: Myers fullname: Myers, A.C. organization: Comput. Sci. Dept., Cornell Univ., Ithaca, NY, USA |
| BookMark | eNp9kE1Lw0AQQBepYFu9C16KB_WSOrOb_cixFD8peFDPy2azKVvSpO4mSP-9qRWEHnoaBt4bmDcig7qpHSGXCFNEyO5f32fzKQWgUwUCKZ6QIXKuEgBQAzIEyViiJIozMopxBYBpquiQ3C1MvezM0iW5ia6Y-Lpswtq0vqmTsmq-J9HZLvh2e05OS1NFd_E3x-Tz8eFj_pws3p5e5rNFYhnHNhGplchtQTFlIgcLShYukzlIWuQcOSrDs9xaUfCCG8aptFDy3Kl-LVVh2Jjc7u9uQvPVudjqtY_WVZWpXdNFnQGKLOOIPXlzlKSKUc4RevD6AFw1Xaj7L7RSKZUpUtZDYg_Z0MQYXKmtb387tMH4SiPoXWe966x3nfW-cy_CgbgJfm3C9phytVe8c-4fR54JjuwHP0KIQA |
| CODEN | ISACEM |
| CitedBy_id | crossref_primary_10_1016_j_tcs_2014_04_022 crossref_primary_10_3390_fi15070224 crossref_primary_10_1109_TIFS_2017_2707323 crossref_primary_10_1109_ACCESS_2024_3487852 crossref_primary_10_1515_sats_2023_0010 crossref_primary_10_1109_TDSC_2024_3403653 crossref_primary_10_1007_s10515_009_0050_3 crossref_primary_10_1007_s11334_010_0127_y crossref_primary_10_1145_3591276 crossref_primary_10_1145_3371081 crossref_primary_10_3233_JCS_150541 crossref_primary_10_1016_j_cola_2019_100904 crossref_primary_10_1016_j_infsof_2013_09_004 crossref_primary_10_1007_s10207_007_0047_5 crossref_primary_10_1016_j_cl_2016_05_003 crossref_primary_10_1145_3276488 crossref_primary_10_1145_1805974_1805982 crossref_primary_10_1145_3591261 crossref_primary_10_1145_2398857_2384621 crossref_primary_10_1016_j_is_2013_12_006 crossref_primary_10_1016_j_scico_2006_03_002 crossref_primary_10_1145_3436817 crossref_primary_10_1016_j_infsof_2025_107719 crossref_primary_10_1016_j_entcs_2009_11_018 crossref_primary_10_1109_ACCESS_2020_2974487 crossref_primary_10_1016_j_jnca_2018_06_004 crossref_primary_10_1007_s13389_011_0021_z crossref_primary_10_1145_3175660 crossref_primary_10_1007_s10664_024_10556_3 crossref_primary_10_1109_ACCESS_2020_2977992 crossref_primary_10_1016_j_jlamp_2022_100829 crossref_primary_10_1007_s10207_009_0086_1 crossref_primary_10_1016_j_jlap_2007_02_009 crossref_primary_10_1145_3498713 crossref_primary_10_1007_s11334_008_0050_7 crossref_primary_10_1145_1111320_1111071 crossref_primary_10_1002_stvr_272 crossref_primary_10_1155_2012_254942 crossref_primary_10_1007_s10009_024_00765_y crossref_primary_10_1016_j_cose_2011_10_002 crossref_primary_10_1016_j_infsof_2005_08_008 crossref_primary_10_1016_j_jss_2004_11_003 crossref_primary_10_1016_j_jlap_2004_01_003 crossref_primary_10_1007_s11225_010_9223_0 crossref_primary_10_1109_MM_2023_3273009 crossref_primary_10_1145_2858965_2814274 crossref_primary_10_1016_j_cl_2005_05_002 crossref_primary_10_1145_3564785 crossref_primary_10_1016_j_scico_2013_11_031 crossref_primary_10_1145_3720427 crossref_primary_10_3390_info16050405 crossref_primary_10_1016_j_tcs_2015_02_045 crossref_primary_10_1145_3290348 crossref_primary_10_1145_3332371 crossref_primary_10_1016_j_jlamp_2017_12_003 crossref_primary_10_1016_j_scico_2018_08_003 crossref_primary_10_1145_3274282 crossref_primary_10_1007_s10207_024_00939_4 crossref_primary_10_1016_j_engappai_2018_01_002 crossref_primary_10_3233_JCS_191316 crossref_primary_10_1016_j_cosrev_2025_100758 crossref_primary_10_1140_epjst_e2016_60402_0 crossref_primary_10_1145_3729349 crossref_primary_10_1007_s00354_012_0207_7 crossref_primary_10_1145_2480359_2429115 crossref_primary_10_3233_JCS_160557 crossref_primary_10_1016_j_entcs_2020_08_005 crossref_primary_10_1016_j_jcss_2009_11_002 crossref_primary_10_1007_s10515_014_0166_y crossref_primary_10_1007_s00165_016_0381_3 crossref_primary_10_1016_j_cose_2021_102343 crossref_primary_10_1145_3656448 crossref_primary_10_1145_2834114 crossref_primary_10_1109_TDSC_2017_2672983 crossref_primary_10_1145_1571629_1571631 crossref_primary_10_2168_LMCS_7_3_17_2011 crossref_primary_10_1145_3571213 crossref_primary_10_1145_3421473_3421478 crossref_primary_10_1016_j_jss_2004_03_017 crossref_primary_10_1109_JESTPE_2024_3366089 crossref_primary_10_3103_S0146411614070177 crossref_primary_10_1145_1046191_1032305 crossref_primary_10_1017_S0960129511000211 crossref_primary_10_1109_TSC_2008_10 crossref_primary_10_1145_2345156_2254099 crossref_primary_10_1145_2692915_2628151 crossref_primary_10_1145_2786763_2694385 crossref_primary_10_3233_JCS_160542 crossref_primary_10_4028_www_scientific_net_AMM_336_338_2348 crossref_primary_10_1016_j_cl_2013_06_001 crossref_primary_10_1145_1543136_1542474 crossref_primary_10_3233_JCS_160544 crossref_primary_10_1016_j_cose_2021_102299 crossref_primary_10_1016_j_ic_2007_04_002 crossref_primary_10_1017_S096012951100020X crossref_primary_10_1016_j_tcs_2007_05_004 crossref_primary_10_1186_s13635_018_0074_y crossref_primary_10_1002_sec_1708 crossref_primary_10_1007_s10619_024_07449_1 crossref_primary_10_1145_3623382 crossref_primary_10_1007_s10676_023_09730_w crossref_primary_10_1145_2676548 crossref_primary_10_1145_3571740 crossref_primary_10_1145_3649817 crossref_primary_10_1016_j_mejo_2023_106088 crossref_primary_10_1007_s10703_019_00337_w crossref_primary_10_1016_j_micpro_2021_104377 crossref_primary_10_1007_s00778_017_0486_1 crossref_primary_10_1016_j_cosrev_2011_02_002 crossref_primary_10_1016_j_scico_2018_04_006 crossref_primary_10_1016_j_jss_2021_111138 crossref_primary_10_1016_j_cose_2017_04_001 crossref_primary_10_1145_2775054_2694372 crossref_primary_10_1007_s13173_013_0119_5 crossref_primary_10_1145_3483790 crossref_primary_10_1145_1815918_1815932 crossref_primary_10_1016_j_jss_2017_02_040 crossref_primary_10_1007_s10009_021_00622_2 crossref_primary_10_1145_1178625_1178628 crossref_primary_10_1109_MSECP_2003_1253571 crossref_primary_10_1145_2980983_2908092 crossref_primary_10_1145_2619091 crossref_primary_10_1145_1328897_1328478 crossref_primary_10_1145_1328897_1328479 crossref_primary_10_1007_s00165_007_0055_2 crossref_primary_10_3233_JCS_211385 crossref_primary_10_1007_s10207_007_0015_0 crossref_primary_10_1016_j_ic_2014_07_005 crossref_primary_10_1109_MC_2012_1 crossref_primary_10_1145_3229061 crossref_primary_10_1007_s10207_007_0016_z crossref_primary_10_1007_s10462_012_9343_1 crossref_primary_10_1145_2382756_2382791 crossref_primary_10_1145_3360563 crossref_primary_10_1145_2858949_2784758 crossref_primary_10_1109_TCAD_2014_2331332 crossref_primary_10_1145_2345156_2254078 crossref_primary_10_1109_TDSC_2019_2914209 crossref_primary_10_1145_3591250 crossref_primary_10_1145_1945023_1945039 crossref_primary_10_1145_2775054_2694385 crossref_primary_10_1016_j_tcs_2010_01_025 crossref_primary_10_3233_JCS_191342 crossref_primary_10_1145_3711902 crossref_primary_10_1007_s11192_015_1708_1 crossref_primary_10_1145_3375408_3375413 crossref_primary_10_1186_s13677_022_00307_4 crossref_primary_10_1016_j_apal_2011_06_001 crossref_primary_10_1145_1993316_1993551 crossref_primary_10_1007_s11432_014_5168_7 crossref_primary_10_1145_2813885_2737957 crossref_primary_10_3745_KIPSTC_2010_17C_1_015 crossref_primary_10_1145_3093337_3037733 crossref_primary_10_1145_1052883_1052897 crossref_primary_10_1016_j_entcs_2007_10_010 crossref_primary_10_1016_j_entcs_2007_01_059 crossref_primary_10_1016_j_infsof_2008_05_008 crossref_primary_10_1016_j_scico_2020_102414 crossref_primary_10_1145_1290520_1290526 crossref_primary_10_1145_3474385 crossref_primary_10_1145_1016848_1016868 crossref_primary_10_1016_j_cosrev_2021_100431 crossref_primary_10_1016_j_cose_2020_101791 crossref_primary_10_1016_j_tcs_2020_09_039 crossref_primary_10_1145_2096148_2034688 crossref_primary_10_1007_s00236_025_00502_1 crossref_primary_10_1016_j_scico_2007_09_003 crossref_primary_10_1109_TCAD_2015_2424951 crossref_primary_10_1017_S0960129513000583 crossref_primary_10_1145_3573270 crossref_primary_10_1145_1698750_1698754 crossref_primary_10_3745_KIPSTC_2010_17C_1_001 crossref_primary_10_1016_j_cose_2006_08_009 crossref_primary_10_3233_JCS_15805 crossref_primary_10_1016_j_cose_2022_103090 crossref_primary_10_1145_2541228_2555295 crossref_primary_10_1007_s10009_024_00756_z crossref_primary_10_1109_TR_2015_2457411 crossref_primary_10_1016_j_jsc_2014_09_028 crossref_primary_10_1145_1095809_1095826 crossref_primary_10_1080_00207179_2014_944356 crossref_primary_10_1109_TSE_2018_2861707 crossref_primary_10_1145_2775051_2676994 crossref_primary_10_1145_1952982_1952988 crossref_primary_10_1145_3371924 crossref_primary_10_1016_j_entcs_2011_11_014 crossref_primary_10_1016_j_entcs_2005_02_031 crossref_primary_10_1145_2654822_2541947 crossref_primary_10_1145_3093333_3009878 crossref_primary_10_1016_j_entcs_2004_07_010 crossref_primary_10_1016_j_scico_2014_03_011 crossref_primary_10_1089_big_2022_0201 crossref_primary_10_1145_1357010_1352603 crossref_primary_10_1016_j_entcs_2005_11_077 crossref_primary_10_1007_s10703_021_00376_2 crossref_primary_10_1145_2980983_2908100 crossref_primary_10_1145_1667209_1667223 crossref_primary_10_1007_s10207_014_0257_6 crossref_primary_10_1016_j_tcs_2007_02_004 crossref_primary_10_1145_2578855_2535847 crossref_primary_10_1016_j_entcs_2005_10_031 crossref_primary_10_1145_2544174_2500574 crossref_primary_10_1016_j_matpr_2021_01_738 crossref_primary_10_1145_1667209_1667222 crossref_primary_10_1145_3296979_3192375 crossref_primary_10_1145_3690636 crossref_primary_10_1145_1082983_1083204 crossref_primary_10_1145_1631687_1596598 crossref_primary_10_1016_j_jss_2023_111918 crossref_primary_10_1017_S0960129512000850 crossref_primary_10_1145_1993316_1993518 crossref_primary_10_1016_j_entcs_2007_09_012 crossref_primary_10_1109_ACCESS_2018_2815766 crossref_primary_10_1145_2578855_2535862 crossref_primary_10_1080_01972243_2011_607038 crossref_primary_10_1145_3093333_3009889 crossref_primary_10_1145_3296957_3173213 crossref_primary_10_1007_s10817_020_09566_9 crossref_primary_10_1007_s00165_012_0237_4 crossref_primary_10_1016_j_tcs_2008_01_024 crossref_primary_10_1145_1993316_1993512 crossref_primary_10_1145_3649861 crossref_primary_10_1016_S1571_0661_04_80824_7 crossref_primary_10_1145_2685616 crossref_primary_10_1016_j_scico_2025_103351 crossref_primary_10_1016_S1571_0661_03_50014_7 crossref_primary_10_1186_s13638_016_0711_4 crossref_primary_10_1038_s41598_022_25697_y crossref_primary_10_3233_JCS_15784 crossref_primary_10_1093_logcom_exp053 crossref_primary_10_1145_1082983_1083216 crossref_primary_10_1145_1809028_1806643 crossref_primary_10_3745_KIPSTA_2008_15_A_1_45 crossref_primary_10_1017_S0956796816000058 crossref_primary_10_1109_ACCESS_2024_3410019 crossref_primary_10_1145_3632886 crossref_primary_10_1145_3428244 crossref_primary_10_1007_s10817_020_09577_6 crossref_primary_10_1016_j_cose_2023_103642 crossref_primary_10_1016_j_jlap_2010_07_005 crossref_primary_10_1007_s10207_024_00886_0 crossref_primary_10_1145_1410234_1410239 crossref_primary_10_1109_JETCAS_2021_3075098 crossref_primary_10_1007_s11859_012_0866_8 crossref_primary_10_1016_j_knosys_2008_11_004 crossref_primary_10_1007_s00607_021_00924_y crossref_primary_10_1145_1047659_1040319 crossref_primary_10_1049_ip_sen_20030985 crossref_primary_10_1051_ita_2008026 crossref_primary_10_1145_2786763_2694372 crossref_primary_10_1145_3498668 crossref_primary_10_1145_3444963 crossref_primary_10_1016_j_tcs_2008_04_033 crossref_primary_10_1016_S1353_4858_10_70037_4 crossref_primary_10_1016_j_tcs_2008_04_032 crossref_primary_10_1049_iet_ifs_2012_0342 crossref_primary_10_1016_j_tcs_2012_10_047 crossref_primary_10_1016_j_infsof_2015_12_006 crossref_primary_10_1016_j_jlamp_2022_100761 crossref_primary_10_1016_j_jlap_2013_05_001 crossref_primary_10_1016_j_scico_2005_07_010 crossref_primary_10_1016_j_cose_2015_12_004 crossref_primary_10_1145_1513443_1513447 crossref_primary_10_1145_3024086 crossref_primary_10_1016_j_knosys_2007_05_003 crossref_primary_10_1145_2980983_2908113 crossref_primary_10_1145_3643781 crossref_primary_10_1145_1543135_1542484 crossref_primary_10_1145_1543135_1542485 crossref_primary_10_1016_j_entcs_2005_12_115 crossref_primary_10_1007_s10009_020_00552_5 crossref_primary_10_1145_3296979_3192383 crossref_primary_10_1016_j_tcs_2008_04_028 crossref_primary_10_1145_2578855_2535839 crossref_primary_10_3233_JCS_17984 crossref_primary_10_3233_JCS_200036 crossref_primary_10_1007_s11036_024_02332_w crossref_primary_10_1145_3447867 crossref_primary_10_1145_3106739 crossref_primary_10_1007_s10207_007_0019_9 crossref_primary_10_3390_electronics12061332 crossref_primary_10_1145_3022671_2984002 crossref_primary_10_1145_3093336_3037733 crossref_primary_10_1145_3485464 crossref_primary_10_1109_ACCESS_2019_2895261 crossref_primary_10_1016_j_entcs_2009_02_071 crossref_primary_10_1016_j_jlamp_2021_100733 crossref_primary_10_3103_S0146411618070039 crossref_primary_10_1016_j_ijcip_2010_09_001 crossref_primary_10_1109_TC_2022_3209923 crossref_primary_10_1109_TCAD_2011_2120970 crossref_primary_10_1145_2103621_2103667 crossref_primary_10_1145_3452096 crossref_primary_10_1109_TSE_2019_2931331 crossref_primary_10_1007_s10703_015_0232_5 crossref_primary_10_1017_S096012951100017X crossref_primary_10_1016_j_jlap_2008_09_003 crossref_primary_10_1109_ACCESS_2017_2780254 crossref_primary_10_1145_2544173_2509554 crossref_primary_10_1016_j_entcs_2005_12_092 crossref_primary_10_1016_j_ic_2009_06_007 crossref_primary_10_1145_2638548 crossref_primary_10_1145_2024723_2000087 crossref_primary_10_1016_j_cose_2008_05_002 crossref_primary_10_1145_3360608 crossref_primary_10_1145_3360607 crossref_primary_10_1145_3434316 crossref_primary_10_3233_JCS_181136 crossref_primary_10_1145_2034574_2034792 crossref_primary_10_1016_j_entcs_2009_07_056 crossref_primary_10_1145_3704887 crossref_primary_10_1109_TIFS_2012_2189105 crossref_primary_10_1017_S0960129511000181 crossref_primary_10_1145_982962_964017 crossref_primary_10_1145_1323293_1294295 crossref_primary_10_1145_2103621_2103677 crossref_primary_10_1631_FITEE_1601371 crossref_primary_10_1007_s11416_018_0317_y crossref_primary_10_1145_3054924 crossref_primary_10_1145_3643567 crossref_primary_10_1145_3747589 crossref_primary_10_1007_s10703_024_00447_0 crossref_primary_10_1016_j_scico_2004_01_002 crossref_primary_10_1145_3090064_3090071 crossref_primary_10_1080_0144929X_2015_1128976 crossref_primary_10_1016_j_entcs_2017_04_002 crossref_primary_10_1145_3290389 crossref_primary_10_1145_3290388 crossref_primary_10_1016_j_tcs_2006_12_019 crossref_primary_10_1109_ACCESS_2025_3555873 crossref_primary_10_1145_2829949 crossref_primary_10_1016_j_cose_2007_07_002 crossref_primary_10_1017_S0960129511000193 crossref_primary_10_1109_TNSM_2013_122313_130423 crossref_primary_10_1145_1805974_1805977 crossref_primary_10_1145_3491201 crossref_primary_10_1007_s10703_019_00334_z crossref_primary_10_1145_3487292 crossref_primary_10_1017_S0956796816000241 crossref_primary_10_1145_2345156_2254100 crossref_primary_10_1145_3290390 crossref_primary_10_1145_1111320_1111045 crossref_primary_10_1145_1111320_1111046 crossref_primary_10_1145_1111320_1111044 crossref_primary_10_1016_j_entcs_2007_02_027 crossref_primary_10_1016_j_scico_2013_03_012 crossref_primary_10_1017_S0956796814000033 crossref_primary_10_1145_3371072 crossref_primary_10_1145_2644865_2541947 crossref_primary_10_1016_j_jss_2012_05_061 crossref_primary_10_1145_2501654_2501663 crossref_primary_10_1016_j_scico_2011_10_008 crossref_primary_10_1145_3408987 crossref_primary_10_1145_2775050_2633371 crossref_primary_10_1016_j_cl_2018_07_003 crossref_primary_10_1145_1323293_1294275 crossref_primary_10_1109_TDSC_2012_73 |
| Cites_doi | 10.3233/JCS-1999-72-305 10.1007/3-540-48294-6_20 10.1007/3-540-60360-3_47 10.1109/CSFW.1995.518560 10.1109/secpri.2001.924288 10.1007/3-540-45309-1_6 10.1007/3-540-59293-8_221 10.1007/3-540-44685-0_11 10.1109/SP.1982.10014 10.1145/268946.268976 10.1145/365230.365252 10.3233/JCS-1994/1995-3103 10.1109/TIT.1983.1056650 10.1007/3-540-45309-1_4 10.1007/3-540-68697-5_9 10.1016/S1571-0661(04)00290-7 10.1145/324133.324266 10.1109/CSFW.1999.779775 10.1007/BFb0053547 10.1145/362375.362389 10.1145/325694.325729 10.1109/CSFW.1993.246640 10.1007/3-540-45789-5_27 10.1109/SECPRI.1988.8110 10.1145/775265.775268 10.1017/S0956796897002906 10.1007/3-540-44743-1_3 10.1109/CSFW.2002.1021826 10.1145/292540.292561 10.1109/csfw.2002.1021820 10.1145/503272.503281 10.1007/978-1-4419-8598-9 10.1109/SECPRI.2002.1004364 10.1145/565816.503302 10.1007/3-540-45315-6_2 10.1109/CSFW.2002.1021804 10.1145/351240.351245 10.1109/RISP.1990.63848 10.1007/3-540-48340-3_26 10.1145/1067625.806556 10.1016/S1571-0661(04)00152-5 10.1007/3-540-58618-0_56 10.1145/263699.263712 10.1109/FTDCS.1995.525008 10.1007/BFb0030629 10.1109/SP.1985.10005 10.1109/CSFW.1997.596807 10.1016/S0304-3975(02)00010-5 10.1109/CSFW.2001.930151 10.1016/0890-5401(91)90030-6 10.21236/ADA462529 10.3233/JCS-2003-11406 10.3233/JCS-1996-42-304 10.1109/PROC.1975.9939 10.1109/SP.1984.10019 10.1145/355616.364017 10.1145/325694.325702 10.1109/CSFW.2002.1021819 10.1007/3-540-44577-3_6 10.1145/292540.292555 10.1007/3-540-49099-X_4 10.1145/292540.292560 10.1109/CSFW.2000.856937 10.1007/3-540-45789-5_26 10.1145/503272.503302 10.1007/3-540-45789-5_23 10.1109/CSFW.2001.930133 10.1145/357084.357088 10.21236/ADA463011 10.1145/168619.168635 10.1006/inco.1998.2740 10.1145/268998.266669 10.1145/359636.359712 10.1007/978-3-662-03811-6 10.1109/SECPRI.1999.766716 10.1109/RISP.1994.296590 10.1109/CSFW.2001.930142 10.1109/CSFW.2000.856935 10.1145/363516.363520 10.1023/A:1020843229247 10.1109/CSFW.2000.856943 10.1007/3-540-48320-9_32 10.1109/32.481534 10.1109/CSFW.2000.856941 10.1023/A:1011553200337 10.1109/SECPRI.1998.674834 10.1109/CSFW.2000.856940 10.1145/502034.502036 10.1016/S0167-6423(99)00024-6 10.1145/360051.360056 10.1007/3-540-48224-5_32 10.1145/512950.512973 10.1145/268946.268975 10.1109/CSFW.2002.1021818 10.1145/91556.91577 10.1093/comjnl/17.2.143 10.1017/cbo9780511609619 10.1007/3-540-45608-2_1 10.1007/978-1-349-12020-8_1 10.1007/3-540-49019-1_9 10.1006/inco.2000.3020 10.1109/CSFW.2001.930141 10.1145/584091.584093 10.1109/CSFW.2000.856936 10.1109/SECPRI.1995.398927 10.1145/357401.357402 10.1016/S0096-0551(02)00006-1 10.1109/CSFW.1998.683153 10.1007/3-540-45022-X_35 10.1007/BFb0014571 10.1109/sp.1987.10009 10.1007/BF03180570 10.1109/LICS.1999.782639 10.1145/319301.319345 10.1145/335169.335201 10.21236/ADB145741 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2003 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2003 |
| DBID | RIA RIE AAYXX CITATION 7SP 8FD L7M F28 FR3 |
| DOI | 10.1109/JSAC.2002.806121 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Engineering Research Database Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-0008 |
| EndPage | 19 |
| ExternalDocumentID | 2429240641 10_1109_JSAC_2002_806121 1159651 |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 41~ 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT ADRHT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IBMZZ ICLAB IES IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS TN5 VH1 AAYXX CITATION 7SP 8FD L7M F28 FR3 |
| ID | FETCH-LOGICAL-c351t-64c715cd21436b0c087de97b072db51518a59bcc6d5d5a3527c0f5be85d5f8da3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 996 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000181030800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0733-8716 |
| IngestDate | Sun Sep 28 01:30:18 EDT 2025 Sun Sep 28 06:26:10 EDT 2025 Sun Nov 30 04:33:40 EST 2025 Sat Nov 29 08:05:55 EST 2025 Tue Nov 18 19:37:55 EST 2025 Wed Aug 27 02:47:43 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c351t-64c715cd21436b0c087de97b072db51518a59bcc6d5d5a3527c0f5be85d5f8da3 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 content type line 23 |
| PQID | 884274123 |
| PQPubID | 23500 |
| PageCount | 15 |
| ParticipantIDs | proquest_miscellaneous_28325510 proquest_miscellaneous_901699511 ieee_primary_1159651 crossref_citationtrail_10_1109_JSAC_2002_806121 crossref_primary_10_1109_JSAC_2002_806121 proquest_journals_884274123 |
| PublicationCentury | 2000 |
| PublicationDate | 2003-Jan. 2003-01-00 20030101 |
| PublicationDateYYYYMMDD | 2003-01-01 |
| PublicationDate_xml | – month: 01 year: 2003 text: 2003-Jan. |
| PublicationDecade | 2000 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE journal on selected areas in communications |
| PublicationTitleAbbrev | J-SAC |
| PublicationYear | 2003 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref56 ref59 ref58 Pierro (ref74) ref52 ref55 Reitman (ref96) 1978 Box (ref23) Zdancewic (ref94) 2002 ref51 Myers (ref44) 2001 ref46 ref45 ref48 ref47 ref42 Wagner (ref29) 2000 ref43 Bell (ref37) 1973; 1 ref49 ref7 Giambiagi (ref69) 2002 ref9 ref4 Morrisett (ref118) 1995 ref3 ref6 ref5 ref101 ref40 Fenton (ref35) 1973 ref36 ref31 ref30 ref33 ref146 ref32 ref147 Barthe (ref8); LNCS 1722 ref39 ref26 ref20 ref22 Cohen (ref50) 1978 ref21 ref28 ref27 Thiemann (ref100); LNCS 2028 ref13 ref12 ref15 ref128 ref14 ref129 ref97 ref127 ref11 ref99 ref124 ref10 Leino (ref84); LNCS 1422 ref98 ref125 Sabelfeld (ref138) 2001 ref17 Giambiagi (ref108) 2001 ref16 ref19 ref18 Bodei (ref126) 2000 Denning (ref41) 1982 Abadi (ref79) 1996 Barendregt (ref75) 1984 ref93 ref133 ref92 ref134 Mizuno (ref53) ref95 Agat (ref119) 2000 ref131 ref132 ref130 ref89 ref139 ref86 ref137 ref85 ref88 ref87 ref136 Lindholm (ref24) 1996 Mizuno (ref54) Ørbæk (ref61) 1997 ref82 ref144 Honda (ref91); LNCS 1782 ref145 ref142 ref83 ref143 ref141 ref80 Sutherland (ref81) ref78 ref109 ref106 ref107 Sabelfeld (ref90); LNCS 2244 ref104 ref105 ref77 ref102 ref76 ref103 ref2 ref1 Abramksy (ref135) 1998 ref71 ref111 ref70 ref112 ref73 ref72 ref110 ref68 LaPadula (ref38) 1973; 4 ref67 ref117 ref64 ref115 ref63 ref116 ref66 ref113 ref65 ref114 Fritzinger (ref25) Biba (ref34) 1977 Ryan (ref140) 2001; LNCS 2171 ref60 ref122 ref123 ref62 ref120 ref121 |
| References_xml | – ident: ref9 doi: 10.3233/JCS-1999-72-305 – volume-title: Compiling with types year: 1995 ident: ref118 – ident: ref46 doi: 10.1007/3-540-48294-6_20 – ident: ref2 doi: 10.1007/3-540-60360-3_47 – ident: ref104 doi: 10.1109/CSFW.1995.518560 – ident: ref124 doi: 10.1109/secpri.2001.924288 – ident: ref110 doi: 10.1007/3-540-45309-1_6 – ident: ref59 doi: 10.1007/3-540-59293-8_221 – ident: ref147 doi: 10.1007/3-540-44685-0_11 – ident: ref47 doi: 10.1109/SP.1982.10014 – ident: ref5 doi: 10.1145/268946.268976 – ident: ref21 doi: 10.1145/365230.365252 – ident: ref139 doi: 10.3233/JCS-1994/1995-3103 – ident: ref19 doi: 10.1109/TIT.1983.1056650 – ident: ref12 doi: 10.1007/3-540-45309-1_4 – ident: ref101 doi: 10.1007/3-540-68697-5_9 – ident: ref73 doi: 10.1016/S1571-0661(04)00290-7 – ident: ref97 doi: 10.1145/324133.324266 – volume: LNCS 2028 volume-title: Proc. European Symp. Programming ident: ref100 article-title: Enforcing security properties by type specialization – ident: ref141 doi: 10.1109/CSFW.1999.779775 – ident: ref129 doi: 10.1007/BFb0053547 – ident: ref18 doi: 10.1145/362375.362389 – ident: ref70 doi: 10.1145/325694.325729 – ident: ref56 doi: 10.1109/CSFW.1993.246640 – volume-title: Static analysis and computer security: New techniques for software assurance year: 2000 ident: ref29 – ident: ref72 doi: 10.1007/3-540-45789-5_27 – ident: ref137 doi: 10.1109/SECPRI.1988.8110 – ident: ref20 doi: 10.1145/775265.775268 – ident: ref60 doi: 10.1017/S0956796897002906 – volume-title: Licentiate dissertation, Royal Inst. Technol. year: 2001 ident: ref108 article-title: Secrecy for mobile implementations of security protocols – start-page: 297 volume-title: Foundations of Secure Computation year: 1978 ident: ref50 article-title: Information transmission in sequential programs – ident: ref131 doi: 10.1007/3-540-44743-1_3 – ident: ref93 doi: 10.1109/CSFW.2002.1021826 – ident: ref7 doi: 10.1145/292540.292561 – start-page: 1 volume-title: Proc. IEEE Computer Security Foundations Workshop ident: ref74 article-title: Approximate noninterference – ident: ref13 doi: 10.1109/csfw.2002.1021820 – ident: ref92 doi: 10.1145/503272.503281 – volume-title: The Lambda Calculus, Its Syntax and Semantics. year: 1984 ident: ref75 – volume-title: A Theory of Objects. year: 1996 ident: ref79 doi: 10.1007/978-1-4419-8598-9 – ident: ref142 doi: 10.1109/SECPRI.2002.1004364 – ident: ref77 doi: 10.1145/565816.503302 – ident: ref98 doi: 10.1007/3-540-45315-6_2 – ident: ref113 doi: 10.1109/CSFW.2002.1021804 – ident: ref16 doi: 10.1145/351240.351245 – ident: ref103 doi: 10.1109/RISP.1990.63848 – ident: ref121 doi: 10.1007/3-540-48340-3_26 – ident: ref49 doi: 10.1145/1067625.806556 – ident: ref111 doi: 10.1016/S1571-0661(04)00152-5 – start-page: 175 volume-title: Proc. National Computer Security Conf. ident: ref81 article-title: A model of information – volume-title: Type Based Techniques for Covert Channel Elimination and Register Allocation year: 2000 ident: ref119 – ident: ref57 doi: 10.1007/3-540-58618-0_56 – ident: ref30 doi: 10.1145/263699.263712 – ident: ref58 doi: 10.1109/FTDCS.1995.525008 – ident: ref63 doi: 10.1007/BFb0030629 – ident: ref43 doi: 10.1109/SP.1985.10005 – ident: ref67 doi: 10.1109/CSFW.1997.596807 – ident: ref89 doi: 10.1016/S0304-3975(02)00010-5 – volume: 1 year: 1973 ident: ref37 article-title: Secure Computer Systems: Mathematical Foundations publication-title: MITRE Corp., Bedford, MA, MTR-2547 – volume-title: The Java Virtual Machine. year: 1996 ident: ref24 – ident: ref99 doi: 10.1109/CSFW.2001.930151 – ident: ref105 doi: 10.1016/0890-5401(91)90030-6 – ident: ref102 doi: 10.21236/ADA462529 – ident: ref116 doi: 10.3233/JCS-2003-11406 – ident: ref3 doi: 10.3233/JCS-1996-42-304 – ident: ref117 doi: 10.1109/PROC.1975.9939 – ident: ref48 doi: 10.1109/SP.1984.10019 – volume-title: Semantic models for the security of sequential and concurrent programs year: 2001 ident: ref138 – ident: ref22 doi: 10.1145/355616.364017 – volume-title: Information flow in parallel programs: An axiomatic approach year: 1978 ident: ref96 – volume: LNCS 1782 start-page: 180 volume-title: Proc. Eur. Symp. Programming ident: ref91 article-title: Secure information flow as typed process behavior – ident: ref10 doi: 10.1145/325694.325702 – ident: ref145 doi: 10.1109/CSFW.2002.1021819 – ident: ref33 doi: 10.1007/3-540-44577-3_6 – ident: ref15 doi: 10.1145/292540.292555 – ident: ref85 doi: 10.1007/3-540-49099-X_4 – volume-title: Confidentiality for Implementations of Security Protocols. year: 2002 ident: ref69 – ident: ref123 doi: 10.1145/292540.292560 – ident: ref11 doi: 10.1109/CSFW.2000.856937 – ident: ref136 doi: 10.1007/3-540-45789-5_26 – ident: ref14 doi: 10.1145/503272.503302 – start-page: 56 volume-title: Proc. Nat. Computer Security Conf. ident: ref53 article-title: Information flow control in a distributed object-oriented system with statically-bound object variables – ident: ref112 doi: 10.1007/3-540-45789-5_23 – ident: ref65 doi: 10.1109/CSFW.2001.930133 – ident: ref52 doi: 10.1145/357084.357088 – ident: ref51 doi: 10.21236/ADA463011 – volume-title: Cryptography and Data Security. year: 1982 ident: ref41 – ident: ref27 doi: 10.1145/168619.168635 – ident: ref107 doi: 10.1006/inco.1998.2740 – ident: ref4 doi: 10.1145/268998.266669 – ident: ref40 doi: 10.1145/359636.359712 – volume-title: Sun Microsystems, Inc. ident: ref25 article-title: Java security – ident: ref125 doi: 10.1007/978-3-662-03811-6 – volume-title: Information protection systems year: 1973 ident: ref35 – ident: ref32 doi: 10.1109/SECPRI.1999.766716 – year: 2001 ident: ref44 article-title: Jif: Java Information Flow, Software release – ident: ref45 doi: 10.1109/RISP.1994.296590 – ident: ref115 doi: 10.1109/CSFW.2001.930142 – volume-title: Trust and dependence analysis year: 1997 ident: ref61 – volume: LNCS 1422 start-page: 254 volume-title: Proc. Mathematics of Program Construction ident: ref84 article-title: A semantic approach to secure information flow – ident: ref146 doi: 10.1109/CSFW.2000.856935 – ident: ref26 doi: 10.1145/363516.363520 – ident: ref76 doi: 10.1023/A:1020843229247 – ident: ref143 doi: 10.1109/CSFW.2000.856943 – ident: ref130 doi: 10.1007/3-540-48320-9_32 – ident: ref80 doi: 10.1109/32.481534 – ident: ref109 doi: 10.1109/CSFW.2000.856941 – ident: ref17 doi: 10.1023/A:1011553200337 – volume-title: Programming languages for information security year: 2002 ident: ref94 – ident: ref106 doi: 10.1109/SECPRI.1998.674834 – ident: ref68 doi: 10.1109/CSFW.2000.856940 – ident: ref71 doi: 10.1145/502034.502036 – ident: ref66 doi: 10.1016/S0167-6423(99)00024-6 – ident: ref62 doi: 10.1145/360051.360056 – ident: ref88 doi: 10.1007/3-540-48224-5_32 – ident: ref133 doi: 10.1145/512950.512973 – ident: ref6 doi: 10.1145/268946.268975 – ident: ref78 doi: 10.1109/CSFW.2002.1021818 – ident: ref23 article-title: (2000) Simple Object Access Protocol (SOAP) 1.1 – ident: ref122 doi: 10.1145/91556.91577 – volume-title: Logic and Computation: Proc. 1997 Marktoberdorf Summer School year: 1998 ident: ref135 article-title: Game semantics – ident: ref36 doi: 10.1093/comjnl/17.2.143 – ident: ref120 doi: 10.1017/cbo9780511609619 – volume: LNCS 2171 start-page: 1 volume-title: Foundations Security Analysis and Design year: 2001 ident: ref140 article-title: Mathematical models of computer security-Tutorial lectures doi: 10.1007/3-540-45608-2_1 – year: 1977 ident: ref34 article-title: Integrity Considerations for Secure Computer Systems publication-title: USAF Electronic Systems Division, Bedford, MA, ESD-TR-76-372 – ident: ref39 doi: 10.1007/978-1-349-12020-8_1 – volume: 4 start-page: 239 issue: 2-3 year: 1973 ident: ref38 article-title: Secure Computer Systems: A Mathematical Model publication-title: MITRE Corp., Bedford, MA, MTR-2547, vol. 2 – ident: ref127 doi: 10.1007/3-540-49019-1_9 – volume: LNCS 2244 start-page: 227 volume-title: Proc. Andrei Ershov Int. Conf Perspectives System Informatics ident: ref90 article-title: The impact of synchronization on secure information flow in concurrent programs – ident: ref128 doi: 10.1006/inco.2000.3020 – ident: ref87 doi: 10.1109/CSFW.2001.930141 – ident: ref114 doi: 10.1145/584091.584093 – start-page: 558 volume-title: Proc. Nat. Computer Security Conf. ident: ref54 article-title: A least fixed point approach to inter-procedural information flow control – ident: ref83 doi: 10.1109/CSFW.2000.856936 – ident: ref95 doi: 10.1109/SECPRI.1995.398927 – ident: ref1 doi: 10.1145/357401.357402 – ident: ref132 doi: 10.1016/S0096-0551(02)00006-1 – ident: ref86 doi: 10.1109/CSFW.1998.683153 – ident: ref144 doi: 10.1007/3-540-45022-X_35 – volume: LNCS 1722 start-page: 53 volume-title: Proc. FLOPS ident: ref8 article-title: Partial evaluation and noninterference for object calculi – ident: ref64 doi: 10.1007/BFb0014571 – ident: ref82 doi: 10.1109/sp.1987.10009 – ident: ref55 doi: 10.1007/BF03180570 – ident: ref134 doi: 10.1109/LICS.1999.782639 – ident: ref28 doi: 10.1145/319301.319345 – ident: ref31 doi: 10.1145/335169.335201 – start-page: 525 volume-title: Current Trends in Theoretical Computer Science year: 2000 ident: ref126 article-title: Security analysis using flow logics – ident: ref42 doi: 10.21236/ADB145741 |
| SSID | ssj0014482 |
| Score | 2.3826222 |
| Snippet | Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 5 |
| SubjectTerms | Access control Assurance Computer information security Computer security Concurrent computing Cryptography Data security Encryption Focusing Information analysis Information security Information systems Military computing Policies Protection Security |
| Title | Language-based information-flow security |
| URI | https://ieeexplore.ieee.org/document/1159651 https://www.proquest.com/docview/884274123 https://www.proquest.com/docview/28325510 https://www.proquest.com/docview/901699511 |
| Volume | 21 |
| WOSCitedRecordID | wos000181030800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-0008 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014482 issn: 0733-8716 databaseCode: RIE dateStart: 19830101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7M4YM-eJtinZc--KBgtqS3JI9jOERkCCrsrbRJCsJYZRf9--ak3VS8gH1qaUrDSdPznXOS7wM4V1yoKIgKkkU8IBGniuRhxElmXZPRkglZi03w4VCMRvK-AVervTDGGLf4zHTw1NXydakWmCrrWvQiE9wvvcZ5Uu3VWlUMbJjhKgY8DAkGAcuSJJXd24de3y1G6Ah06OyLC3KaKt9-xM67DLb_168d2KpRpN-rhn0XGmayB5ufuAVbcHFXZyIJOirt1wypOA6kGJdv_qxWrtuHp8H1Y_-G1LIIRIUxm5MkUpzFSgcW6iQ5VVRwbSTPKQ90buEJE1ksc6USHes4swCLK1rEuRH2shA6Cw-gOSkn5hB8IQWjmiEFjbZxSCYLFhYmYazAgwYedJeWSlXNGY7SFePUxQ5UpmhblLIM0sq2Hlyunnip-DL-aNtCW360q8zoQXs5GGk9oWapEBES7QShB2eru3YmYHkjm5hyMUtRdMniP-qB_0sLidQzFlKyo5_f3IYNt1bPZViOoTmfLswJrKvX-fNseuq-t3f02dDM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7IFNQH72K99sEHBbMlbdokjyIOL3MITvCttEkKgmziNv375qTdVLyAfWppSsNJ0_Odc5LvAzjUQmoe8ZLkXESEC6pJEXNBcuearFFMqlpsQnS78uFB3c7AyXQvjLXWLz6zTTz1tXwz0GNMlbUcelEp7peeTTiPaLVba1ozcIGGrxmIOCYYBkyKklS1ru5Oz_xyhKZEl86-OCGvqvLtV-z9S3v5fz1bgaUaR4an1cCvwoztr8HiJ3bBdTjq1LlIgq7KhDVHKo4EKZ8Gb-Gw1q7bgPv2ee_sgtTCCETHCRuRlGvBEm0iB3bSgmoqhbFKFFREpnAAhck8UYXWqUlMkjuIJTQtk8JKd1lKk8eb0OgP-nYLQqkko4YhCY1xkUiuShaXNmWsxINGAbQmlsp0zRqO4hVPmY8eqMrQtihmGWWVbQM4nj7xXDFm_NF2HW350a4yYwA7k8HI6ik1zKTkSLUTxQEcTO-6uYAFjrxvB-NhhrJLDgHSAMJfWigkn3Ggkm3__OYDmL_o3XSyzmX3egcW_Mo9n2_ZhcboZWz3YE6_jh6HL_v-23sH-yDUEw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Language-based+information-flow+security&rft.jtitle=IEEE+journal+on+selected+areas+in+communications&rft.au=Sabelfeld%2C+A.&rft.au=Myers%2C+A.C.&rft.date=2003-01-01&rft.pub=IEEE&rft.issn=0733-8716&rft.volume=21&rft.issue=1&rft.spage=5&rft.epage=19&rft_id=info:doi/10.1109%2FJSAC.2002.806121&rft.externalDocID=1159651 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0733-8716&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0733-8716&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0733-8716&client=summon |