default search action
Search dblp for Publications
export results for ""Language-Based Security"."
@article{DBLP:journals/access/DernerBZB24, author = {Erik Derner and Kristina Batistic and Jan Zah{\'{a}}lka and Robert Babuska}, title = {A Security Risk Taxonomy for Prompt-Based Interaction With Large Language Models}, journal = {{IEEE} Access}, volume = {12}, pages = {126176--126187}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3450388}, doi = {10.1109/ACCESS.2024.3450388}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DernerBZB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/WeiCW24, author = {Yu{-}Chi Wei and Yu{-}Chun Chang and Wei{-}Chen Wu}, title = {Multi-language IoT information security standard item matching based on deep learning}, journal = {Comput. Sci. Inf. Syst.}, volume = {21}, number = {2}, pages = {663--683}, year = {2024}, url = {https://doi.org/10.2298/csis230822012w}, doi = {10.2298/CSIS230822012W}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/WeiCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LiSCD24, author = {Zhan Li and Xingyu Song and Shi Chen and Kazuyuki Demachi}, title = {Data, language and graph-based reasoning methods for identification of human malicious behaviors in nuclear security}, journal = {Expert Syst. Appl.}, volume = {236}, pages = {121367}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121367}, doi = {10.1016/J.ESWA.2023.121367}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/LiSCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Jia24, author = {Qi Jia}, title = {Enhancing IoT Security in Russian Language Teaching: {A} Improved {BPNN} and Blockchain-Based Approach for Privacy and Access Control}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {3}, pages = {1466--1477}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i3.2674}, doi = {10.12694/SCPE.V25I3.2674}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/Jia24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ialp/ZhangGLSY24, author = {Yu Zhang and Yongbing Gao and Weihao Li and Zirong Su and Lidong Yang}, editor = {Rui Liu and Lei Wang and Feilong Bao and Yanfeng Lu and Cunhang Fan and Minghui Dong}, title = {Chinese Generation and Security Index Evaluation Based on Large Language Model}, booktitle = {International Conference on Asian Language Processing, {IALP} 2024, Hohhot, China, August 4-6, 2024}, pages = {151--161}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/IALP63756.2024.10661189}, doi = {10.1109/IALP63756.2024.10661189}, timestamp = {Fri, 18 Oct 2024 12:36:28 +0200}, biburl = {https://dblp.org/rec/conf/ialp/ZhangGLSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/SkalkaN24, author = {Christian Skalka and Joseph P. Near}, editor = {Alessandro Bruni and Alberto Momigliano and Matteo Pradella and Matteo Rossi and James Cheney}, title = {Language-Based Security for Low-Level {MPC}}, booktitle = {Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming, {PPDP} 2024, Milano, Italy, September 9-11, 2024}, pages = {16:1--16:14}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3678232.3678246}, doi = {10.1145/3678232.3678246}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppdp/SkalkaN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiHDLCOLH24, author = {Yuexin Li and Chengyu Huang and Shumin Deng and Mei Lin Lock and Tri Cao and Nay Oo and Hoon Wei Lim and Bryan Hooi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/li-yuexin}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiHDLCOLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-07448, author = {Naisheng Liang and Alex Potanin}, title = {Evaluating the Language-Based Security for Plugin Development}, journal = {CoRR}, volume = {abs/2405.07448}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.07448}, doi = {10.48550/ARXIV.2405.07448}, eprinttype = {arXiv}, eprint = {2405.07448}, timestamp = {Sat, 15 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-07448.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-08025, author = {G{\'{a}}bor Antal and Bal{\'{a}}zs Mosolyg{\'{o}} and Norbert V{\'{a}}ndor and P{\'{e}}ter Heged{\"{u}}s}, title = {A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages}, journal = {CoRR}, volume = {abs/2405.08025}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.08025}, doi = {10.48550/ARXIV.2405.08025}, eprinttype = {arXiv}, eprint = {2405.08025}, timestamp = {Sat, 15 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-08025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-06718, author = {Atilla {\"{O}}zg{\"{u}}r and Yilmaz Uygun}, title = {A Simple Architecture for Enterprise Large Language Model Applications based on Role based security and Clearance Levels using Retrieval-Augmented Generation or Mixture of Experts}, journal = {CoRR}, volume = {abs/2407.06718}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.06718}, doi = {10.48550/ARXIV.2407.06718}, eprinttype = {arXiv}, eprint = {2407.06718}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-06718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-16504, author = {Christian Skalka and Joseph P. Near}, title = {Language-Based Security for Low-Level {MPC}}, journal = {CoRR}, volume = {abs/2407.16504}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.16504}, doi = {10.48550/ARXIV.2407.16504}, eprinttype = {arXiv}, eprint = {2407.16504}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-16504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Karami23, author = {Farzane Karami}, title = {Language-based Approaches for Enforcing Privacy and Security Policies}, school = {University of Oslo, Norway}, year = {2023}, url = {http://hdl.handle.net/10852/105685}, timestamp = {Sun, 03 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Karami23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/gr/Tsinganos23, author = {Nikolaos Tsinganos}, title = {Utilizing deep learning and natural language processing to recognise chat-based social engineering attacks for cyber security situational awareness}, school = {University of Macedonia, Greece}, year = {2023}, url = {http://hdl.handle.net/10442/hedi/54739}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/gr/Tsinganos23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlHamdanS23, author = {Abdullah AlHamdan and Cristian{-}Alexandru Staicu}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {SandDriller: {A} Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3457--3474}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/alhamdan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AlHamdanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangLLH22, author = {Can Huang and Cheng Li and Jiashuo Liang and Xinhui Han}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: MSILDiffer - {A} Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3367--3369}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563518}, doi = {10.1145/3548606.3563518}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangLLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-03214, author = {Chandra Thapa and Seung Ick Jang and Muhammad Ejaz Ahmed and Seyit Camtepe and Josef Pieprzyk and Surya Nepal}, title = {Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms}, journal = {CoRR}, volume = {abs/2204.03214}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.03214}, doi = {10.48550/ARXIV.2204.03214}, eprinttype = {arXiv}, eprint = {2204.03214}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-03214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/RoweGR20, author = {Paul D. Rowe and Joshua D. Guttman and John D. Ramsdell}, editor = {Vivek Nigam and Tajana Ban Kirigin and Carolyn L. Talcott and Joshua D. Guttman and Stepan L. Kuznetsov and Boon Thau Loo and Mitsuhiro Okada}, title = {Assumption-Based Analysis of Distance-Bounding Protocols with cpsa}, booktitle = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {12300}, pages = {146--166}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62077-6\_11}, doi = {10.1007/978-3-030-62077-6\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/RoweGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AntalMVH20, author = {G{\'{a}}bor Antal and Bal{\'{a}}zs Mosolyg{\'{o}} and Norbert V{\'{a}}ndor and P{\'{e}}ter Heged{\"{u}}s}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Chiara Garau and Ivan Blecic and David Taniar and Bernady O. Apduhan and Ana Maria A. C. Rocha and Eufemia Tarantino and Carmelo Maria Torre and Yeliz Karaca}, title = {A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages}, booktitle = {Computational Science and Its Applications - {ICCSA} 2020 - 20th International Conference, Cagliari, Italy, July 1-4, 2020, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12252}, pages = {1019--1034}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58811-3\_72}, doi = {10.1007/978-3-030-58811-3\_72}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AntalMVH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/0001S20, author = {Peter Amthor and Marius Schlegel}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Towards Language Support for Model-based Security Policy Engineering}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {513--521}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009893205130521}, doi = {10.5220/0009893205130521}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/0001S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/FishMA20, author = {Jennifer A. Fish and Darya Melicher and Jonathan Aldrich}, title = {A case study in language-based security: building an {I/O} library for Wyvern}, booktitle = {Proceedings of the 2020 {ACM} {SIGPLAN} International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, Onward! 2020, Virtual, November, 2020}, pages = {34--47}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3426428.3426913}, doi = {10.1145/3426428.3426913}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/oopsla/FishMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/Mu20, author = {Chunyan Mu}, editor = {Toshiaki Aoki and Qin Li}, title = {A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems}, booktitle = {International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2020, Hangzhou, China, December 11-13, 2020}, pages = {185--192}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TASE49443.2020.00033}, doi = {10.1109/TASE49443.2020.00033}, timestamp = {Tue, 27 Apr 2021 14:38:43 +0200}, biburl = {https://dblp.org/rec/conf/tase/Mu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/LiDCK20, title = {Design of intelligent community security system based on visual tracking and large data natural language processing technology}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {6}, pages = {7107--7117}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.3233/JIFS-179789}, doi = {10.3233/JIFS-179789}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/LiDCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanKAKD19, author = {Wilayat Khan and Muhammad Kamran and Aakash Ahmad and Farrukh Aslam Khan and Abdelouahid Derhab}, title = {Formal Analysis of Language-Based Android Security Using Theorem Proving Approach}, journal = {{IEEE} Access}, volume = {7}, pages = {16550--16560}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2895261}, doi = {10.1109/ACCESS.2019.2895261}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanKAKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/ZhaoMA19, author = {Hui Zhao and Fr{\'{e}}d{\'{e}}ric Mallet and Ludovic Apvrille}, title = {A Language-Based Multi-View Approach for Combining Functional and Security Models}, booktitle = {26th Asia-Pacific Software Engineering Conference, {APSEC} 2019, Putrajaya, Malaysia, December 2-5, 2019}, pages = {426--433}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/APSEC48747.2019.00064}, doi = {10.1109/APSEC48747.2019.00064}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsec/ZhaoMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuoDHTJ19, author = {Xiaolong Guo and Raj Gautam Dutta and Jiaji He and Mark M. Tehranipoor and Yier Jin}, title = {QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2019, McLean, VA, USA, May 5-10, 2019}, pages = {91--100}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HST.2019.8740840}, doi = {10.1109/HST.2019.8740840}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/GuoDHTJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-02613, author = {Ruturaj K. Vaidya and Lorenzo De Carli and Drew Davidson and Vaibhav Rastogi}, title = {Security Issues in Language-based Sofware Ecosystems}, journal = {CoRR}, volume = {abs/1903.02613}, year = {2019}, url = {http://arxiv.org/abs/1903.02613}, eprinttype = {arXiv}, eprint = {1903.02613}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-02613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/WangWG18, author = {Meijuan Wang and Jian Wang and Kejun Guo}, title = {Extensible markup language keywords search based on security access control}, journal = {Int. J. Grid Util. Comput.}, volume = {9}, number = {1}, pages = {43--50}, year = {2018}, url = {https://doi.org/10.1504/IJGUC.2018.10011389}, doi = {10.1504/IJGUC.2018.10011389}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijguc/WangWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/MaiPGB18, author = {Phu X. Mai and Fabrizio Pastore and Arda Goknil and Lionel C. Briand}, editor = {Sudipto Ghosh and Roberto Natella and Bojan Cukic and Robin S. Poston and Nuno Laranjeiro}, title = {A Natural Language Programming Approach for Requirements-Based Security Testing}, booktitle = {29th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2018, Memphis, TN, USA, October 15-18, 2018}, pages = {58--69}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ISSRE.2018.00017}, doi = {10.1109/ISSRE.2018.00017}, timestamp = {Wed, 26 Jun 2024 17:26:37 +0200}, biburl = {https://dblp.org/rec/conf/issre/MaiPGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DewaldMW17, author = {Florian Dewald and Heiko Mantel and Alexandra Weber}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {{AVR} Processors as a Platform for Language-Based Security}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {427--445}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_25}, doi = {10.1007/978-3-319-66402-6\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DewaldMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/KucherovB17, author = {Mikhail M. Kucherov and N. A. Bogulskaya}, title = {Logical Language of Certificate-Based Access Control in Security Models}, booktitle = {Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, {ICCSP} 2017, Wuhan, China, March 17 - 19, 2017}, pages = {131--135}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3058060.3058067}, doi = {10.1145/3058060.3058067}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/KucherovB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/NguyenTI17, author = {Hoai Viet Nguyen and Jan Tolsdorf and Luigi Lo Iacono}, editor = {Javier L{\'{o}}pez and Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis}, title = {On the Security Expressiveness of REST-Based {API} Definition Languages}, booktitle = {Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10442}, pages = {215--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64483-7\_14}, doi = {10.1007/978-3-319-64483-7\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/NguyenTI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Lampesberger16, author = {Harald Lampesberger}, title = {An Incremental Learner for Language-Based Anomaly Detection in {XML}}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {156--170}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.35}, doi = {10.1109/SPW.2016.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Lampesberger16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/NicolaMV15, author = {Rocco De Nicola and Claudio Antares Mezzina and Hugo Torres Vieira}, editor = {Chiara Bodei and Gian{-}Luigi Ferrari and Corrado Priami}, title = {Global Protocol Implementations via Attribute-Based Communication}, booktitle = {Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9465}, pages = {219--237}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25527-9\_15}, doi = {10.1007/978-3-319-25527-9\_15}, timestamp = {Fri, 23 Jun 2023 22:30:53 +0200}, biburl = {https://dblp.org/rec/conf/birthday/NicolaMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/SouissiSC15, author = {Samih Souissi and Layth Sliman and Benoit Charroux}, editor = {Ajith Abraham and Sang Yong Han and Salah Al{-}Sharhan and Hongbo Liu}, title = {A Novel Security Architecture Based on Multi-level Rule Expression Language}, booktitle = {Hybrid Intelligent Systems - 15th International Conference {HIS} 2015 on Hybrid Intelligent Systems, Seoul, South Korea, November 16-18, 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {420}, pages = {259--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27221-4\_22}, doi = {10.1007/978-3-319-27221-4\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/his/SouissiSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Jang14, author = {Dongseok Jang}, title = {Language-based Security for Web Browsers /}, school = {University of California, San Diego, {USA}}, year = {2014}, url = {http://www.escholarship.org/uc/item/0k87h880}, timestamp = {Thu, 04 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Jang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Pullicino14, author = {Kyle Pullicino}, title = {Jif: Language-based Information-flow Security in Java}, journal = {CoRR}, volume = {abs/1412.8639}, year = {2014}, url = {http://arxiv.org/abs/1412.8639}, eprinttype = {arXiv}, eprint = {1412.8639}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Pullicino14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UnalC13, author = {Devrim Unal and M. Ufuk {\c{C}}aglayan}, title = {{XFPM-RBAC:} XML-based specification language for security policies in multidomain mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1420--1444}, year = {2013}, url = {https://doi.org/10.1002/sec.411}, doi = {10.1002/SEC.411}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/UnalC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/CaprinZ13, author = {Edward Caprin and Yan Zhang}, editor = {Bart De Decker and Jana Dittmann and Christian Kraetzer and Claus Vielhauer}, title = {SocACL: An ASP-Based Access Control Language for Online Social Networks}, booktitle = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8099}, pages = {207--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40779-6\_20}, doi = {10.1007/978-3-642-40779-6\_20}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/CaprinZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/HassanH13, author = {Doaa Hassan and Raquel Hill}, title = {A Language Based Security Approach for Securing Map-Reduce Computations in the Cloud}, booktitle = {{IEEE/ACM} 6th International Conference on Utility and Cloud Computing, {UCC} 2013, Dresden, Germany, December 9-12, 2013}, pages = {307--308}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/UCC.2013.65}, doi = {10.1109/UCC.2013.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/HassanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BhargavanDM13, author = {Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and Sergio Maffeis}, editor = {Samuel T. King}, title = {Language-based Defenses Against Untrusted Browser Origins}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {653--670}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/bhargavan}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/BhargavanDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/AndersonC12, author = {Paul Anderson and James Cheney}, editor = {Umut A. Acar and Todd J. Green}, title = {Toward Provenance-Based Security for Configuration Languages}, booktitle = {4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston, MA, USA, June 14-15, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/tapp12/workshop-program/presentation/anderson}, timestamp = {Tue, 02 Feb 2021 08:04:55 +0100}, biburl = {https://dblp.org/rec/conf/tapp/AndersonC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Wasserrab2011, author = {Daniel Wasserrab}, title = {From formal semantics to verified slicing: a modular framework with applications in language based security}, school = {Karlsruhe Institute of Technology}, year = {2011}, url = {https://d-nb.info/1010875388}, isbn = {978-3-86644-594-9}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Wasserrab2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HongLS11, author = {Sunghyuck Hong and Sunho Lim and Jaeki Song}, title = {Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: {A} Survey}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {4}, pages = {805--821}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.04.010}, doi = {10.3837/TIIS.2011.04.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HongLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Ardagna11b, author = {Claudio A. Ardagna}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {XML-Based Access Control Languages}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1395--1399}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_833}, doi = {10.1007/978-1-4419-5906-5\_833}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/Ardagna11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Bonatti11, author = {Piero A. Bonatti}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Logic-Based Authorization Languages}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {734--736}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_821}, doi = {10.1007/978-1-4419-5906-5\_821}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Bonatti11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/StutzU10, author = {Thomas St{\"{u}}tz and Andreas Uhl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {81--92}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_9}, doi = {10.1007/978-3-642-13241-4\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/StutzU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/HassanMR10, author = {D. Hassan and Mohammad Reza Mousavi and Michel A. Reniers}, editor = {Anindya Banerjee and Deepak Garg}, title = {Restricted delegation and revocation in language-based security: (position paper)}, booktitle = {Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1814217.1814222}, doi = {10.1145/1814217.1814222}, timestamp = {Sat, 11 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/HassanMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MeiklejohnEKHL10, author = {Sarah Meiklejohn and C. Christopher Erway and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Theodora Hinkle and Anna Lysyanskaya}, title = {{ZKPDL:} {A} Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {193--206}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Meiklejohn.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MeiklejohnEKHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/OrekuLM09, author = {George S. Oreku and Jianzhong Li and Fredrick Mtenzi}, title = {Language based information routing security: policy enforcement}, journal = {Int. Arab J. Inf. Technol.}, volume = {6}, number = {1}, pages = {91--98}, year = {2009}, url = {http://iajit.org/index.php?option=com\_content\&task=blogcategory\&id=61\&Itemid=290}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/OrekuLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ChiversP09, author = {Howard Chivers and Richard F. Paige}, title = {XRound: {A} reversible template language and its application in model-based security analysis}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {876--893}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.006}, doi = {10.1016/J.INFSOF.2008.05.006}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/ChiversP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/Nino09, author = {Jaime Ni{\~{n}}o}, editor = {John D. McGregor}, title = {An overview of programming language based security}, booktitle = {Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1566445.1566537}, doi = {10.1145/1566445.1566537}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/Nino09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/Kobayashi09, author = {Naoki Kobayashi}, editor = {Anupam Datta}, title = {Higher-Order Program Verification and Language-Based Security}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {17--23}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_2}, doi = {10.1007/978-3-642-10622-4\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asian/Kobayashi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/AboElFotohDM09, author = {Muhammad AboElFotoh and Thomas Dean and Ryan Mayor}, editor = {Patrick Martin and Anatol W. Kark and Darlene A. Stewart}, title = {An empirical evaluation of a language-based security testing technique}, booktitle = {Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, November 2-5, 2009, Toronto, Ontario, Canada}, pages = {112--121}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1723028.1723043}, doi = {10.1145/1723028.1723043}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/AboElFotohDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/Chaudhuri09, author = {Avik Chaudhuri}, editor = {Stephen Chong and David A. Naumann}, title = {Language-based security on Android}, booktitle = {Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009}, pages = {1--7}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1554339.1554341}, doi = {10.1145/1554339.1554341}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/pldi/Chaudhuri09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Swamy08, author = {Nikhil Swamy}, title = {Language-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs)}, school = {University of Maryland, College Park, MD, {USA}}, year = {2008}, url = {https://hdl.handle.net/1903/8622}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Swamy08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/Myers08, author = {Andrew C. Myers}, editor = {Gilles Barthe and Frank S. de Boer}, title = {Guiding Distributed Systems Synthesis with Language-Based Security Policies}, booktitle = {Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June 4-6, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5051}, pages = {1}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68863-1\_1}, doi = {10.1007/978-3-540-68863-1\_1}, timestamp = {Sat, 19 Oct 2019 20:16:59 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/Myers08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/FrancescoM07, author = {Nicoletta De Francesco and Luca Martini}, title = {Instruction-level security analysis for information flow in stack-based assembly languages}, journal = {Inf. Comput.}, volume = {205}, number = {9}, pages = {1334--1370}, year = {2007}, url = {https://doi.org/10.1016/j.ic.2007.04.002}, doi = {10.1016/J.IC.2007.04.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/FrancescoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/MantelR07, author = {Heiko Mantel and Alexander Reinhard}, editor = {Rocco De Nicola}, title = {Controlling the What and Where of Declassification in Language-Based Security}, booktitle = {Programming Languages and Systems, 16th European Symposium on Programming, {ESOP} 2007, Held as Part of the Joint European Conferences on Theory and Practics of Software, {ETAPS} 2007, Braga, Portugal, March 24 - April 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4421}, pages = {141--156}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71316-6\_11}, doi = {10.1007/978-3-540-71316-6\_11}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/MantelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {A Security Hardening Language Based on Aspect-Orientation}, booktitle = {E-business and Telecommunications - 4th International Conference, {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {23}, pages = {254--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88653-2\_19}, doi = {10.1007/978-3-540-88653-2\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MouradLD07, author = {Azzam Mourad and Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and Mourad Debbabi}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {A High-Level Aspect-Oriented based Language for Software Security Hardening}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {363--370}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MouradLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/WeiA06, author = {Huaqiang Wei and Jim Alves{-}Foss}, title = {Applying the layered decision model to the design of language-based security systems}, booktitle = {Proceedings of the 2006 {IEEE} International Conference on Information Reuse and Integration, {IRI} - 2006: Heuristic Systems Engineering, September 16-18, 2006, Waikoloa, Hawaii, {USA}}, pages = {182--187}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2006}, url = {https://doi.org/10.1109/IRI.2006.252410}, doi = {10.1109/IRI.2006.252410}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/WeiA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/Bartoletti05, author = {Massimo Bartoletti}, title = {Language-based security}, school = {University of Pisa, Italy}, year = {2005}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0028704}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Bartoletti05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AbadiMS05, author = {Mart{\'{\i}}n Abadi and Greg Morrisett and Andrei Sabelfeld}, title = {"Language-Based Security"}, journal = {J. Funct. Program.}, volume = {15}, number = {2}, pages = {129}, year = {2005}, url = {https://doi.org/10.1017/S0956796804005428}, doi = {10.1017/S0956796804005428}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/AbadiMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/Mastroeni05, author = {Isabella Mastroeni}, editor = {Kwangkeun Yi}, title = {On the R{\^{o}}le of Abstract Non-interference in Language-Based Security}, booktitle = {Programming Languages and Systems, Third Asian Symposium, {APLAS} 2005, Tsukuba, Japan, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3780}, pages = {418--433}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11575467\_27}, doi = {10.1007/11575467\_27}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aplas/Mastroeni05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/TseZ05, author = {Stephen Tse and Steve Zdancewic}, editor = {Shmuel Sagiv}, title = {A Design for a Security-Typed Language with Certificate-Based Declassification}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3444}, pages = {279--294}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31987-0\_20}, doi = {10.1007/978-3-540-31987-0\_20}, timestamp = {Fri, 27 Jan 2023 15:04:25 +0100}, biburl = {https://dblp.org/rec/conf/esop/TseZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/FocardiRS05, author = {Riccardo Focardi and Sabina Rossi and Andrei Sabelfeld}, editor = {Vladimiro Sassone}, title = {Bridging Language-Based and Process Calculi Security}, booktitle = {Foundations of Software Science and Computational Structures, 8th International Conference, {FOSSACS} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3441}, pages = {299--315}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31982-5\_19}, doi = {10.1007/978-3-540-31982-5\_19}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/FocardiRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/HuY05, author = {Guangrui Hu and Wantao Yu}, editor = {Hamid R. Arabnia}, title = {Confined Migration: {A} Language Based Security Method for Mobile Computation}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada, USA, June 27-30, 2005, Volume 3}, pages = {1290--1296}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 25 Jan 2006 09:52:18 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/HuY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Mousavi06, author = {Mohammad Reza Mousavi}, editor = {Luca Aceto and Andrew D. Gordon}, title = {Towards {SOS} Meta-Theory for Language-Based Security}, booktitle = {Proceedings of the Workshop "Essays on Algebraic Process Calculi", {APC} 25, Bertinoro, Italy, August 1-5, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {162}, pages = {267--271}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.12.092}, doi = {10.1016/J.ENTCS.2005.12.092}, timestamp = {Fri, 20 Jan 2023 12:38:53 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Mousavi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/05/PejasS05, author = {Jerzy Pejas and Pawel Sukiennik}, editor = {Khalid Saeed and Jerzy Pejas}, title = {Protocol for Certificate Based Access Control Policies Description Language}, booktitle = {Information Processing and Security Systems}, pages = {207--216}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-26325-X\_21}, doi = {10.1007/0-387-26325-X\_21}, timestamp = {Sun, 02 Jun 2019 20:42:31 +0200}, biburl = {https://dblp.org/rec/books/sp/05/PejasS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2003P3411, editor = {Anindya Banerjee and Heiko Mantel and David A. Naumann and Andrei Sabelfeld}, title = {Language-Based Security, 5.-10. October 2003}, series = {Dagstuhl Seminar Proceedings}, volume = {03411}, publisher = {IBFI, Schloss Dagstuhl, Germany}, year = {2005}, url = {http://drops.dagstuhl.de/portals/03411/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2003P3411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/JeongSSM04, author = {Jongil Jeong and Dongkyoo Shin and Dongil Shin and Kiyoung Moon}, editor = {Jeffrey Xu Yu and Xuemin Lin and Hongjun Lu and Yanchun Zhang}, title = {Java-Based Single Sign-On Library Supporting {SAML} (Security Assertion Markup Language) for Distributed Web Services}, booktitle = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference, APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3007}, pages = {891--894}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24655-8\_99}, doi = {10.1007/978-3-540-24655-8\_99}, timestamp = {Mon, 16 Mar 2020 17:44:09 +0100}, biburl = {https://dblp.org/rec/conf/apweb/JeongSSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Mwakalinga04, author = {Jeffy Mwakalinga}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Integrated Security System Based On Security Assertion Markup Language Standard}, booktitle = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa}, pages = {1--9}, publisher = {ISSA, Pretoria, South Africa}, year = {2004}, url = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/070.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Mwakalinga04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SabelfeldM03, author = {Andrei Sabelfeld and Andrew C. Myers}, title = {Language-based information-flow security}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {5--19}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806121}, doi = {10.1109/JSAC.2002.806121}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SabelfeldM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeldalH03, author = {Rogardt Heldal and Fredrik Hultin}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Bridging Model-Based and Language-Based Security}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {235--252}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_14}, doi = {10.1007/978-3-540-39650-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeldalH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BanerjeeMNS03, author = {Anindya Banerjee and Heiko Mantel and David A. Naumann and Andrei Sabelfeld}, editor = {Anindya Banerjee and Heiko Mantel and David A. Naumann and Andrei Sabelfeld}, title = {03411 Final Report - Language Based Security}, booktitle = {Language-Based Security, 5.-10. October 2003}, series = {Dagstuhl Seminar Proceedings}, volume = {03411}, publisher = {IBFI, Schloss Dagstuhl, Germany}, year = {2003}, url = {http://drops.dagstuhl.de/opus/volltexte/2005/172}, timestamp = {Thu, 10 Jun 2021 13:02:09 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BanerjeeMNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BanerjeeMNS03a, author = {Anindya Banerjee and Heiko Mantel and David A. Naumann and Andrei Sabelfeld}, editor = {Anindya Banerjee and Heiko Mantel and David A. Naumann and Andrei Sabelfeld}, title = {03411 Abstracts Collection - Language Based Security}, booktitle = {Language-Based Security, 5.-10. October 2003}, series = {Dagstuhl Seminar Proceedings}, volume = {03411}, publisher = {IBFI, Schloss Dagstuhl, Germany}, year = {2003}, url = {http://drops.dagstuhl.de/opus/volltexte/2005/173}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BanerjeeMNS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DeTreville02, author = {John DeTreville}, title = {Binder, a Logic-Based Security Language}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {105--113}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004365}, doi = {10.1109/SECPRI.2002.1004365}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/DeTreville02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/LodderstedtBD02, author = {Torsten Lodderstedt and David A. Basin and J{\"{u}}rgen Doser}, editor = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and Heinrich Hu{\ss}mann and Stephen Cook}, title = {SecureUML: {A} UML-Based Modeling Language for Model-Driven Security}, booktitle = {{UML} 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30 - October 4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2460}, pages = {426--441}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45800-X\_33}, doi = {10.1007/3-540-45800-X\_33}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uml/LodderstedtBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/SchneiderMH01, author = {Fred B. Schneider and J. Gregory Morrisett and Robert Harper}, editor = {Reinhard Wilhelm}, title = {A Language-Based Approach to Security}, booktitle = {Informatics - 10 Years Back. 10 Years Ahead}, series = {Lecture Notes in Computer Science}, volume = {2000}, pages = {86--101}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44577-3\_6}, doi = {10.1007/3-540-44577-3\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/SchneiderMH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertinoCF01, author = {Elisa Bertino and Silvana Castano and Elena Ferrari}, editor = {Ravi S. Sandhu and Trent Jaeger}, title = {On specifying security policies for web documents with an XML-based language}, booktitle = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001}, pages = {57--65}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/373256.373264}, doi = {10.1145/373256.373264}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BertinoCF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/Schneider01, author = {Fred B. Schneider}, editor = {Patrick Cousot}, title = {Language-Based Security: What's Needed and Why}, booktitle = {Static Analysis, 8th International Symposium, {SAS} 2001, Paris, France, July 16-18, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2126}, pages = {374}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47764-0\_21}, doi = {10.1007/3-540-47764-0\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/Schneider01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/Scedrov00, author = {Andre Scedrov}, title = {A language-based security analysis}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {25}, number = {1}, pages = {80--81}, year = {2000}, url = {https://doi.org/10.1145/340855.341016}, doi = {10.1145/340855.341016}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/Scedrov00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WallachAF00, author = {Dan S. Wallach and Andrew W. Appel and Edward W. Felten}, title = {{SAFKASI:} a security mechanism for language-based systems}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {341--378}, year = {2000}, url = {https://doi.org/10.1145/363516.363520}, doi = {10.1145/363516.363520}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/WallachAF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/Kozen99, author = {Dexter Kozen}, editor = {Miroslaw Kutylowski and Leszek Pacholski and Tomasz Wierzbicki}, title = {Language-Based Security}, booktitle = {Mathematical Foundations of Computer Science 1999, 24th International Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1672}, pages = {284--298}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48340-3\_26}, doi = {10.1007/3-540-48340-3\_26}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/Kozen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/Byce93, author = {Ciar{\'{a}}n Bryce}, editor = {Bhavani Thuraisingham and Ravi S. Sandhu and T. C. Ting}, title = {An Access Control Model or a Parallel Object-Based Programming Language}, booktitle = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93} Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993}, series = {Workshops in Computing}, pages = {166--182}, publisher = {Springer}, year = {1993}, timestamp = {Wed, 29 Jun 2022 15:37:45 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/Byce93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.