Search dblp for Publications

export results for ""Language-Based Security"."

 download as .bib file

@article{DBLP:journals/access/DernerBZB24,
  author       = {Erik Derner and
                  Kristina Batistic and
                  Jan Zah{\'{a}}lka and
                  Robert Babuska},
  title        = {A Security Risk Taxonomy for Prompt-Based Interaction With Large Language
                  Models},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {126176--126187},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3450388},
  doi          = {10.1109/ACCESS.2024.3450388},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DernerBZB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/WeiCW24,
  author       = {Yu{-}Chi Wei and
                  Yu{-}Chun Chang and
                  Wei{-}Chen Wu},
  title        = {Multi-language IoT information security standard item matching based
                  on deep learning},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {21},
  number       = {2},
  pages        = {663--683},
  year         = {2024},
  url          = {https://doi.org/10.2298/csis230822012w},
  doi          = {10.2298/CSIS230822012W},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/WeiCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LiSCD24,
  author       = {Zhan Li and
                  Xingyu Song and
                  Shi Chen and
                  Kazuyuki Demachi},
  title        = {Data, language and graph-based reasoning methods for identification
                  of human malicious behaviors in nuclear security},
  journal      = {Expert Syst. Appl.},
  volume       = {236},
  pages        = {121367},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121367},
  doi          = {10.1016/J.ESWA.2023.121367},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/LiSCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Jia24,
  author       = {Qi Jia},
  title        = {Enhancing IoT Security in Russian Language Teaching: {A} Improved
                  {BPNN} and Blockchain-Based Approach for Privacy and Access Control},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {3},
  pages        = {1466--1477},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i3.2674},
  doi          = {10.12694/SCPE.V25I3.2674},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/Jia24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiHDLCOLH24,
  author       = {Yuexin Li and
                  Chengyu Huang and
                  Shumin Deng and
                  Mei Lin Lock and
                  Tri Cao and
                  Nay Oo and
                  Hoon Wei Lim and
                  Bryan Hooi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs
                  for Enhancing Reference-Based Phishing Detection},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/li-yuexin},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiHDLCOLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-07448,
  author       = {Naisheng Liang and
                  Alex Potanin},
  title        = {Evaluating the Language-Based Security for Plugin Development},
  journal      = {CoRR},
  volume       = {abs/2405.07448},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.07448},
  doi          = {10.48550/ARXIV.2405.07448},
  eprinttype    = {arXiv},
  eprint       = {2405.07448},
  timestamp    = {Sat, 15 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-07448.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-08025,
  author       = {G{\'{a}}bor Antal and
                  Bal{\'{a}}zs Mosolyg{\'{o}} and
                  Norbert V{\'{a}}ndor and
                  P{\'{e}}ter Heged{\"{u}}s},
  title        = {A Data-Mining Based Study of Security Vulnerability Types and Their
                  Mitigation in Different Languages},
  journal      = {CoRR},
  volume       = {abs/2405.08025},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.08025},
  doi          = {10.48550/ARXIV.2405.08025},
  eprinttype    = {arXiv},
  eprint       = {2405.08025},
  timestamp    = {Sat, 15 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-08025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-06718,
  author       = {Atilla {\"{O}}zg{\"{u}}r and
                  Yilmaz Uygun},
  title        = {A Simple Architecture for Enterprise Large Language Model Applications
                  based on Role based security and Clearance Levels using Retrieval-Augmented
                  Generation or Mixture of Experts},
  journal      = {CoRR},
  volume       = {abs/2407.06718},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.06718},
  doi          = {10.48550/ARXIV.2407.06718},
  eprinttype    = {arXiv},
  eprint       = {2407.06718},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-06718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-16504,
  author       = {Christian Skalka and
                  Joseph P. Near},
  title        = {Language-Based Security for Low-Level {MPC}},
  journal      = {CoRR},
  volume       = {abs/2407.16504},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.16504},
  doi          = {10.48550/ARXIV.2407.16504},
  eprinttype    = {arXiv},
  eprint       = {2407.16504},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-16504.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Karami23,
  author       = {Farzane Karami},
  title        = {Language-based Approaches for Enforcing Privacy and Security Policies},
  school       = {University of Oslo, Norway},
  year         = {2023},
  url          = {http://hdl.handle.net/10852/105685},
  timestamp    = {Sun, 03 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Karami23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/gr/Tsinganos23,
  author       = {Nikolaos Tsinganos},
  title        = {Utilizing deep learning and natural language processing to recognise
                  chat-based social engineering attacks for cyber security situational
                  awareness},
  school       = {University of Macedonia, Greece},
  year         = {2023},
  url          = {http://hdl.handle.net/10442/hedi/54739},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/gr/Tsinganos23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlHamdanS23,
  author       = {Abdullah AlHamdan and
                  Cristian{-}Alexandru Staicu},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {SandDriller: {A} Fully-Automated Approach for Testing Language-Based
                  JavaScript Sandboxes},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3457--3474},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/alhamdan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AlHamdanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangLLH22,
  author       = {Can Huang and
                  Cheng Li and
                  Jiashuo Liang and
                  Xinhui Han},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: MSILDiffer - {A} Security Patch Analysis Framework Based on
                  Microsoft Intermediate Language for Large Software},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3367--3369},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563518},
  doi          = {10.1145/3548606.3563518},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangLLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-03214,
  author       = {Chandra Thapa and
                  Seung Ick Jang and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Josef Pieprzyk and
                  Surya Nepal},
  title        = {Transformer-Based Language Models for Software Vulnerability Detection:
                  Performance, Model's Security and Platforms},
  journal      = {CoRR},
  volume       = {abs/2204.03214},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.03214},
  doi          = {10.48550/ARXIV.2204.03214},
  eprinttype    = {arXiv},
  eprint       = {2204.03214},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-03214.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/RoweGR20,
  author       = {Paul D. Rowe and
                  Joshua D. Guttman and
                  John D. Ramsdell},
  editor       = {Vivek Nigam and
                  Tajana Ban Kirigin and
                  Carolyn L. Talcott and
                  Joshua D. Guttman and
                  Stepan L. Kuznetsov and
                  Boon Thau Loo and
                  Mitsuhiro Okada},
  title        = {Assumption-Based Analysis of Distance-Bounding Protocols with cpsa},
  booktitle    = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {12300},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62077-6\_11},
  doi          = {10.1007/978-3-030-62077-6\_11},
  timestamp    = {Sun, 12 Feb 2023 18:48:21 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/RoweGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AntalMVH20,
  author       = {G{\'{a}}bor Antal and
                  Bal{\'{a}}zs Mosolyg{\'{o}} and
                  Norbert V{\'{a}}ndor and
                  P{\'{e}}ter Heged{\"{u}}s},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Chiara Garau and
                  Ivan Blecic and
                  David Taniar and
                  Bernady O. Apduhan and
                  Ana Maria A. C. Rocha and
                  Eufemia Tarantino and
                  Carmelo Maria Torre and
                  Yeliz Karaca},
  title        = {A Data-Mining Based Study of Security Vulnerability Types and Their
                  Mitigation in Different Languages},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2020 - 20th International
                  Conference, Cagliari, Italy, July 1-4, 2020, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12252},
  pages        = {1019--1034},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58811-3\_72},
  doi          = {10.1007/978-3-030-58811-3\_72},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AntalMVH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/0001S20,
  author       = {Peter Amthor and
                  Marius Schlegel},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Towards Language Support for Model-based Security Policy Engineering},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {513--521},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009893205130521},
  doi          = {10.5220/0009893205130521},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/0001S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/FishMA20,
  author       = {Jennifer A. Fish and
                  Darya Melicher and
                  Jonathan Aldrich},
  title        = {A case study in language-based security: building an {I/O} library
                  for Wyvern},
  booktitle    = {Proceedings of the 2020 {ACM} {SIGPLAN} International Symposium on
                  New Ideas, New Paradigms, and Reflections on Programming and Software,
                  Onward! 2020, Virtual, November, 2020},
  pages        = {34--47},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3426428.3426913},
  doi          = {10.1145/3426428.3426913},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/oopsla/FishMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/Mu20,
  author       = {Chunyan Mu},
  editor       = {Toshiaki Aoki and
                  Qin Li},
  title        = {A Language-based Approach to Analysing Flow Security Properties in
                  Virtualised Computing Systems},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2020, Hangzhou, China, December 11-13, 2020},
  pages        = {185--192},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TASE49443.2020.00033},
  doi          = {10.1109/TASE49443.2020.00033},
  timestamp    = {Tue, 27 Apr 2021 14:38:43 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/Mu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/LiDCK20,
  title        = {Design of intelligent community security system based on visual tracking
                  and large data natural language processing technology},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {6},
  pages        = {7107--7117},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.3233/JIFS-179789},
  doi          = {10.3233/JIFS-179789},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/LiDCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKAKD19,
  author       = {Wilayat Khan and
                  Muhammad Kamran and
                  Aakash Ahmad and
                  Farrukh Aslam Khan and
                  Abdelouahid Derhab},
  title        = {Formal Analysis of Language-Based Android Security Using Theorem Proving
                  Approach},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {16550--16560},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2895261},
  doi          = {10.1109/ACCESS.2019.2895261},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanKAKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/ZhaoMA19,
  author       = {Hui Zhao and
                  Fr{\'{e}}d{\'{e}}ric Mallet and
                  Ludovic Apvrille},
  title        = {A Language-Based Multi-View Approach for Combining Functional and
                  Security Models},
  booktitle    = {26th Asia-Pacific Software Engineering Conference, {APSEC} 2019, Putrajaya,
                  Malaysia, December 2-5, 2019},
  pages        = {426--433},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/APSEC48747.2019.00064},
  doi          = {10.1109/APSEC48747.2019.00064},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsec/ZhaoMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuoDHTJ19,
  author       = {Xiaolong Guo and
                  Raj Gautam Dutta and
                  Jiaji He and
                  Mark M. Tehranipoor and
                  Yier Jin},
  title        = {QIF-Verilog: Quantitative Information-Flow based Hardware Description
                  Languages for Pre-Silicon Security Assessment},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2019, McLean, VA, USA, May 5-10, 2019},
  pages        = {91--100},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HST.2019.8740840},
  doi          = {10.1109/HST.2019.8740840},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/GuoDHTJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-02613,
  author       = {Ruturaj K. Vaidya and
                  Lorenzo De Carli and
                  Drew Davidson and
                  Vaibhav Rastogi},
  title        = {Security Issues in Language-based Sofware Ecosystems},
  journal      = {CoRR},
  volume       = {abs/1903.02613},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.02613},
  eprinttype    = {arXiv},
  eprint       = {1903.02613},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-02613.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/WangWG18,
  author       = {Meijuan Wang and
                  Jian Wang and
                  Kejun Guo},
  title        = {Extensible markup language keywords search based on security access
                  control},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {43--50},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJGUC.2018.10011389},
  doi          = {10.1504/IJGUC.2018.10011389},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijguc/WangWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/MaiPGB18,
  author       = {Phu X. Mai and
                  Fabrizio Pastore and
                  Arda Goknil and
                  Lionel C. Briand},
  editor       = {Sudipto Ghosh and
                  Roberto Natella and
                  Bojan Cukic and
                  Robin S. Poston and
                  Nuno Laranjeiro},
  title        = {A Natural Language Programming Approach for Requirements-Based Security
                  Testing},
  booktitle    = {29th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2018, Memphis, TN, USA, October 15-18, 2018},
  pages        = {58--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISSRE.2018.00017},
  doi          = {10.1109/ISSRE.2018.00017},
  timestamp    = {Wed, 26 Jun 2024 17:26:37 +0200},
  biburl       = {https://dblp.org/rec/conf/issre/MaiPGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DewaldMW17,
  author       = {Florian Dewald and
                  Heiko Mantel and
                  Alexandra Weber},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {{AVR} Processors as a Platform for Language-Based Security},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {427--445},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_25},
  doi          = {10.1007/978-3-319-66402-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DewaldMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/KucherovB17,
  author       = {Mikhail M. Kucherov and
                  N. A. Bogulskaya},
  title        = {Logical Language of Certificate-Based Access Control in Security Models},
  booktitle    = {Proceedings of the 2017 International Conference on Cryptography,
                  Security and Privacy, {ICCSP} 2017, Wuhan, China, March 17 - 19, 2017},
  pages        = {131--135},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3058060.3058067},
  doi          = {10.1145/3058060.3058067},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/KucherovB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/NguyenTI17,
  author       = {Hoai Viet Nguyen and
                  Jan Tolsdorf and
                  Luigi Lo Iacono},
  editor       = {Javier L{\'{o}}pez and
                  Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis},
  title        = {On the Security Expressiveness of REST-Based {API} Definition Languages},
  booktitle    = {Trust, Privacy and Security in Digital Business - 14th International
                  Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10442},
  pages        = {215--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64483-7\_14},
  doi          = {10.1007/978-3-319-64483-7\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/NguyenTI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Lampesberger16,
  author       = {Harald Lampesberger},
  title        = {An Incremental Learner for Language-Based Anomaly Detection in {XML}},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {156--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.35},
  doi          = {10.1109/SPW.2016.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Lampesberger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/NicolaMV15,
  author       = {Rocco De Nicola and
                  Claudio Antares Mezzina and
                  Hugo Torres Vieira},
  editor       = {Chiara Bodei and
                  Gian{-}Luigi Ferrari and
                  Corrado Priami},
  title        = {Global Protocol Implementations via Attribute-Based Communication},
  booktitle    = {Programming Languages with Applications to Biology and Security -
                  Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9465},
  pages        = {219--237},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25527-9\_15},
  doi          = {10.1007/978-3-319-25527-9\_15},
  timestamp    = {Fri, 23 Jun 2023 22:30:53 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/NicolaMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/SouissiSC15,
  author       = {Samih Souissi and
                  Layth Sliman and
                  Benoit Charroux},
  editor       = {Ajith Abraham and
                  Sang Yong Han and
                  Salah Al{-}Sharhan and
                  Hongbo Liu},
  title        = {A Novel Security Architecture Based on Multi-level Rule Expression
                  Language},
  booktitle    = {Hybrid Intelligent Systems - 15th International Conference {HIS} 2015
                  on Hybrid Intelligent Systems, Seoul, South Korea, November 16-18,
                  2015},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {420},
  pages        = {259--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27221-4\_22},
  doi          = {10.1007/978-3-319-27221-4\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/his/SouissiSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Jang14,
  author       = {Dongseok Jang},
  title        = {Language-based Security for Web Browsers /},
  school       = {University of California, San Diego, {USA}},
  year         = {2014},
  url          = {http://www.escholarship.org/uc/item/0k87h880},
  timestamp    = {Thu, 04 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Jang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Pullicino14,
  author       = {Kyle Pullicino},
  title        = {Jif: Language-based Information-flow Security in Java},
  journal      = {CoRR},
  volume       = {abs/1412.8639},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.8639},
  eprinttype    = {arXiv},
  eprint       = {1412.8639},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Pullicino14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UnalC13,
  author       = {Devrim Unal and
                  M. Ufuk {\c{C}}aglayan},
  title        = {{XFPM-RBAC:} XML-based specification language for security policies
                  in multidomain mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1420--1444},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.411},
  doi          = {10.1002/SEC.411},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/UnalC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/CaprinZ13,
  author       = {Edward Caprin and
                  Yan Zhang},
  editor       = {Bart De Decker and
                  Jana Dittmann and
                  Christian Kraetzer and
                  Claus Vielhauer},
  title        = {SocACL: An ASP-Based Access Control Language for Online Social Networks},
  booktitle    = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2013, Magdeburg, Germany, September
                  25-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8099},
  pages        = {207--210},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40779-6\_20},
  doi          = {10.1007/978-3-642-40779-6\_20},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/CaprinZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/HassanH13,
  author       = {Doaa Hassan and
                  Raquel Hill},
  title        = {A Language Based Security Approach for Securing Map-Reduce Computations
                  in the Cloud},
  booktitle    = {{IEEE/ACM} 6th International Conference on Utility and Cloud Computing,
                  {UCC} 2013, Dresden, Germany, December 9-12, 2013},
  pages        = {307--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/UCC.2013.65},
  doi          = {10.1109/UCC.2013.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/HassanH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BhargavanDM13,
  author       = {Karthikeyan Bhargavan and
                  Antoine Delignat{-}Lavaud and
                  Sergio Maffeis},
  editor       = {Samuel T. King},
  title        = {Language-based Defenses Against Untrusted Browser Origins},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {653--670},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/bhargavan},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BhargavanDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/AndersonC12,
  author       = {Paul Anderson and
                  James Cheney},
  editor       = {Umut A. Acar and
                  Todd J. Green},
  title        = {Toward Provenance-Based Security for Configuration Languages},
  booktitle    = {4th Workshop on the Theory and Practice of Provenance, TaPP'12, Boston,
                  MA, USA, June 14-15, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/tapp12/workshop-program/presentation/anderson},
  timestamp    = {Tue, 02 Feb 2021 08:04:55 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/AndersonC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Wasserrab2011,
  author       = {Daniel Wasserrab},
  title        = {From formal semantics to verified slicing: a modular framework with
                  applications in language based security},
  school       = {Karlsruhe Institute of Technology},
  year         = {2011},
  url          = {https://d-nb.info/1010875388},
  isbn         = {978-3-86644-594-9},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Wasserrab2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HongLS11,
  author       = {Sunghyuck Hong and
                  Sunho Lim and
                  Jaeki Song},
  title        = {Unified Modeling Language based Analysis of Security Attacks in Wireless
                  Sensor Networks: {A} Survey},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {805--821},
  year         = {2011},
  url          = {https://doi.org/10.3837/tiis.2011.04.010},
  doi          = {10.3837/TIIS.2011.04.010},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/HongLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Ardagna11b,
  author       = {Claudio A. Ardagna},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {XML-Based Access Control Languages},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1395--1399},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_833},
  doi          = {10.1007/978-1-4419-5906-5\_833},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/Ardagna11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Bonatti11,
  author       = {Piero A. Bonatti},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Logic-Based Authorization Languages},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {734--736},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_821},
  doi          = {10.1007/978-1-4419-5906-5\_821},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Bonatti11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/StutzU10,
  author       = {Thomas St{\"{u}}tz and
                  Andreas Uhl},
  editor       = {Bart De Decker and
                  Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Efficient Format-Compliant Encryption of Regular Languages: Block-Based
                  Cycle-Walking},
  booktitle    = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International
                  Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6109},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13241-4\_9},
  doi          = {10.1007/978-3-642-13241-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/StutzU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/HassanMR10,
  author       = {D. Hassan and
                  Mohammad Reza Mousavi and
                  Michel A. Reniers},
  editor       = {Anindya Banerjee and
                  Deepak Garg},
  title        = {Restricted delegation and revocation in language-based security: (position
                  paper)},
  booktitle    = {Proceedings of the 2010 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2010, Toronto, ON, Canada, 10 June, 2010},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1814217.1814222},
  doi          = {10.1145/1814217.1814222},
  timestamp    = {Sat, 11 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/HassanMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MeiklejohnEKHL10,
  author       = {Sarah Meiklejohn and
                  C. Christopher Erway and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Theodora Hinkle and
                  Anna Lysyanskaya},
  title        = {{ZKPDL:} {A} Language-Based System for Efficient Zero-Knowledge Proofs
                  and Electronic Cash},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {193--206},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Meiklejohn.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MeiklejohnEKHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/OrekuLM09,
  author       = {George S. Oreku and
                  Jianzhong Li and
                  Fredrick Mtenzi},
  title        = {Language based information routing security: policy enforcement},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {6},
  number       = {1},
  pages        = {91--98},
  year         = {2009},
  url          = {http://iajit.org/index.php?option=com\_content\&task=blogcategory\&id=61\&Itemid=290},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/OrekuLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ChiversP09,
  author       = {Howard Chivers and
                  Richard F. Paige},
  title        = {XRound: {A} reversible template language and its application in model-based
                  security analysis},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {876--893},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.006},
  doi          = {10.1016/J.INFSOF.2008.05.006},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/ChiversP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/Nino09,
  author       = {Jaime Ni{\~{n}}o},
  editor       = {John D. McGregor},
  title        = {An overview of programming language based security},
  booktitle    = {Proceedings of the 47th Annual Southeast Regional Conference, 2009,
                  Clemson, South Carolina, USA, March 19-21, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1566445.1566537},
  doi          = {10.1145/1566445.1566537},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/Nino09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/Kobayashi09,
  author       = {Naoki Kobayashi},
  editor       = {Anupam Datta},
  title        = {Higher-Order Program Verification and Language-Based Security},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  pages        = {17--23},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_2},
  doi          = {10.1007/978-3-642-10622-4\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/Kobayashi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/AboElFotohDM09,
  author       = {Muhammad AboElFotoh and
                  Thomas Dean and
                  Ryan Mayor},
  editor       = {Patrick Martin and
                  Anatol W. Kark and
                  Darlene A. Stewart},
  title        = {An empirical evaluation of a language-based security testing technique},
  booktitle    = {Proceedings of the 2009 conference of the Centre for Advanced Studies
                  on Collaborative Research, November 2-5, 2009, Toronto, Ontario, Canada},
  pages        = {112--121},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1723028.1723043},
  doi          = {10.1145/1723028.1723043},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/AboElFotohDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/Chaudhuri09,
  author       = {Avik Chaudhuri},
  editor       = {Stephen Chong and
                  David A. Naumann},
  title        = {Language-based security on Android},
  booktitle    = {Proceedings of the 2009 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2009, Dublin, Ireland, 15-21 June, 2009},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1554339.1554341},
  doi          = {10.1145/1554339.1554341},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/Chaudhuri09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Swamy08,
  author       = {Nikhil Swamy},
  title        = {Language-based Enforcement of User-defined Security Policies (As Applied
                  to Multi-tier Web Programs)},
  school       = {University of Maryland, College Park, MD, {USA}},
  year         = {2008},
  url          = {https://hdl.handle.net/1903/8622},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Swamy08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/Myers08,
  author       = {Andrew C. Myers},
  editor       = {Gilles Barthe and
                  Frank S. de Boer},
  title        = {Guiding Distributed Systems Synthesis with Language-Based Security
                  Policies},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems, 10th {IFIP}
                  {WG} 6.1 International Conference, {FMOODS} 2008, Oslo, Norway, June
                  4-6, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5051},
  pages        = {1},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68863-1\_1},
  doi          = {10.1007/978-3-540-68863-1\_1},
  timestamp    = {Sat, 19 Oct 2019 20:16:59 +0200},
  biburl       = {https://dblp.org/rec/conf/fmoods/Myers08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/FrancescoM07,
  author       = {Nicoletta De Francesco and
                  Luca Martini},
  title        = {Instruction-level security analysis for information flow in stack-based
                  assembly languages},
  journal      = {Inf. Comput.},
  volume       = {205},
  number       = {9},
  pages        = {1334--1370},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ic.2007.04.002},
  doi          = {10.1016/J.IC.2007.04.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/FrancescoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/MantelR07,
  author       = {Heiko Mantel and
                  Alexander Reinhard},
  editor       = {Rocco De Nicola},
  title        = {Controlling the What and Where of Declassification in Language-Based
                  Security},
  booktitle    = {Programming Languages and Systems, 16th European Symposium on Programming,
                  {ESOP} 2007, Held as Part of the Joint European Conferences on Theory
                  and Practics of Software, {ETAPS} 2007, Braga, Portugal, March 24
                  - April 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4421},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71316-6\_11},
  doi          = {10.1007/978-3-540-71316-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/MantelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {A Security Hardening Language Based on Aspect-Orientation},
  booktitle    = {E-business and Telecommunications - 4th International Conference,
                  {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {23},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88653-2\_19},
  doi          = {10.1007/978-3-540-88653-2\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A High-Level Aspect-Oriented based Language for Software Security
                  Hardening},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {363--370},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/WeiA06,
  author       = {Huaqiang Wei and
                  Jim Alves{-}Foss},
  title        = {Applying the layered decision model to the design of language-based
                  security systems},
  booktitle    = {Proceedings of the 2006 {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} - 2006: Heuristic Systems Engineering,
                  September 16-18, 2006, Waikoloa, Hawaii, {USA}},
  pages        = {182--187},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IRI.2006.252410},
  doi          = {10.1109/IRI.2006.252410},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/WeiA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Bartoletti05,
  author       = {Massimo Bartoletti},
  title        = {Language-based security},
  school       = {University of Pisa, Italy},
  year         = {2005},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=BNI0028704},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/Bartoletti05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/AbadiMS05,
  author       = {Mart{\'{\i}}n Abadi and
                  Greg Morrisett and
                  Andrei Sabelfeld},
  title        = {"Language-Based Security"},
  journal      = {J. Funct. Program.},
  volume       = {15},
  number       = {2},
  pages        = {129},
  year         = {2005},
  url          = {https://doi.org/10.1017/S0956796804005428},
  doi          = {10.1017/S0956796804005428},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/AbadiMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aplas/Mastroeni05,
  author       = {Isabella Mastroeni},
  editor       = {Kwangkeun Yi},
  title        = {On the R{\^{o}}le of Abstract Non-interference in Language-Based Security},
  booktitle    = {Programming Languages and Systems, Third Asian Symposium, {APLAS}
                  2005, Tsukuba, Japan, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3780},
  pages        = {418--433},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11575467\_27},
  doi          = {10.1007/11575467\_27},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aplas/Mastroeni05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/TseZ05,
  author       = {Stephen Tse and
                  Steve Zdancewic},
  editor       = {Shmuel Sagiv},
  title        = {A Design for a Security-Typed Language with Certificate-Based Declassification},
  booktitle    = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3444},
  pages        = {279--294},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31987-0\_20},
  doi          = {10.1007/978-3-540-31987-0\_20},
  timestamp    = {Fri, 27 Jan 2023 15:04:25 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/TseZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/FocardiRS05,
  author       = {Riccardo Focardi and
                  Sabina Rossi and
                  Andrei Sabelfeld},
  editor       = {Vladimiro Sassone},
  title        = {Bridging Language-Based and Process Calculi Security},
  booktitle    = {Foundations of Software Science and Computational Structures, 8th
                  International Conference, {FOSSACS} 2005, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2005,
                  Edinburgh, UK, April 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3441},
  pages        = {299--315},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31982-5\_19},
  doi          = {10.1007/978-3-540-31982-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/FocardiRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/HuY05,
  author       = {Guangrui Hu and
                  Wantao Yu},
  editor       = {Hamid R. Arabnia},
  title        = {Confined Migration: {A} Language Based Security Method for Mobile
                  Computation},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada,
                  USA, June 27-30, 2005, Volume 3},
  pages        = {1290--1296},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 25 Jan 2006 09:52:18 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/HuY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Mousavi06,
  author       = {Mohammad Reza Mousavi},
  editor       = {Luca Aceto and
                  Andrew D. Gordon},
  title        = {Towards {SOS} Meta-Theory for Language-Based Security},
  booktitle    = {Proceedings of the Workshop "Essays on Algebraic Process Calculi",
                  {APC} 25, Bertinoro, Italy, August 1-5, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {162},
  pages        = {267--271},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.12.092},
  doi          = {10.1016/J.ENTCS.2005.12.092},
  timestamp    = {Fri, 20 Jan 2023 12:38:53 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Mousavi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/05/PejasS05,
  author       = {Jerzy Pejas and
                  Pawel Sukiennik},
  editor       = {Khalid Saeed and
                  Jerzy Pejas},
  title        = {Protocol for Certificate Based Access Control Policies Description
                  Language},
  booktitle    = {Information Processing and Security Systems},
  pages        = {207--216},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-26325-X\_21},
  doi          = {10.1007/0-387-26325-X\_21},
  timestamp    = {Sun, 02 Jun 2019 20:42:31 +0200},
  biburl       = {https://dblp.org/rec/books/sp/05/PejasS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2003P3411,
  editor       = {Anindya Banerjee and
                  Heiko Mantel and
                  David A. Naumann and
                  Andrei Sabelfeld},
  title        = {Language-Based Security, 5.-10. October 2003},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {03411},
  publisher    = {IBFI, Schloss Dagstuhl, Germany},
  year         = {2005},
  url          = {http://drops.dagstuhl.de/portals/03411/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2003P3411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/JeongSSM04,
  author       = {Jongil Jeong and
                  Dongkyoo Shin and
                  Dongil Shin and
                  Kiyoung Moon},
  editor       = {Jeffrey Xu Yu and
                  Xuemin Lin and
                  Hongjun Lu and
                  Yanchun Zhang},
  title        = {Java-Based Single Sign-On Library Supporting {SAML} (Security Assertion
                  Markup Language) for Distributed Web Services},
  booktitle    = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference,
                  APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3007},
  pages        = {891--894},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24655-8\_99},
  doi          = {10.1007/978-3-540-24655-8\_99},
  timestamp    = {Mon, 16 Mar 2020 17:44:09 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/JeongSSM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Mwakalinga04,
  author       = {Jeffy Mwakalinga},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Integrated Security System Based On Security Assertion Markup Language
                  Standard},
  booktitle    = {Proceedings of the {ISSA} 2004 Enabling Tomorrow Conference, 30 June
                  - 1 July 2004, Gallagher Estate, Midrand, South Africa},
  pages        = {1--9},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2004},
  url          = {http://icsa.cs.up.ac.za/issa/2004/Proceedings/Full/070.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Mwakalinga04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SabelfeldM03,
  author       = {Andrei Sabelfeld and
                  Andrew C. Myers},
  title        = {Language-based information-flow security},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {5--19},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806121},
  doi          = {10.1109/JSAC.2002.806121},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SabelfeldM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeldalH03,
  author       = {Rogardt Heldal and
                  Fredrik Hultin},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Bridging Model-Based and Language-Based Security},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_14},
  doi          = {10.1007/978-3-540-39650-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeldalH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BanerjeeMNS03,
  author       = {Anindya Banerjee and
                  Heiko Mantel and
                  David A. Naumann and
                  Andrei Sabelfeld},
  editor       = {Anindya Banerjee and
                  Heiko Mantel and
                  David A. Naumann and
                  Andrei Sabelfeld},
  title        = {03411 Final Report - Language Based Security},
  booktitle    = {Language-Based Security, 5.-10. October 2003},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {03411},
  publisher    = {IBFI, Schloss Dagstuhl, Germany},
  year         = {2003},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2005/172},
  timestamp    = {Thu, 10 Jun 2021 13:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BanerjeeMNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BanerjeeMNS03a,
  author       = {Anindya Banerjee and
                  Heiko Mantel and
                  David A. Naumann and
                  Andrei Sabelfeld},
  editor       = {Anindya Banerjee and
                  Heiko Mantel and
                  David A. Naumann and
                  Andrei Sabelfeld},
  title        = {03411 Abstracts Collection - Language Based Security},
  booktitle    = {Language-Based Security, 5.-10. October 2003},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {03411},
  publisher    = {IBFI, Schloss Dagstuhl, Germany},
  year         = {2003},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2005/173},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BanerjeeMNS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DeTreville02,
  author       = {John DeTreville},
  title        = {Binder, a Logic-Based Security Language},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {105--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004365},
  doi          = {10.1109/SECPRI.2002.1004365},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DeTreville02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/LodderstedtBD02,
  author       = {Torsten Lodderstedt and
                  David A. Basin and
                  J{\"{u}}rgen Doser},
  editor       = {Jean{-}Marc J{\'{e}}z{\'{e}}quel and
                  Heinrich Hu{\ss}mann and
                  Stephen Cook},
  title        = {SecureUML: {A} UML-Based Modeling Language for Model-Driven Security},
  booktitle    = {{UML} 2002 - The Unified Modeling Language, 5th International Conference,
                  Dresden, Germany, September 30 - October 4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2460},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45800-X\_33},
  doi          = {10.1007/3-540-45800-X\_33},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/LodderstedtBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/SchneiderMH01,
  author       = {Fred B. Schneider and
                  J. Gregory Morrisett and
                  Robert Harper},
  editor       = {Reinhard Wilhelm},
  title        = {A Language-Based Approach to Security},
  booktitle    = {Informatics - 10 Years Back. 10 Years Ahead},
  series       = {Lecture Notes in Computer Science},
  volume       = {2000},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44577-3\_6},
  doi          = {10.1007/3-540-44577-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/SchneiderMH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BertinoCF01,
  author       = {Elisa Bertino and
                  Silvana Castano and
                  Elena Ferrari},
  editor       = {Ravi S. Sandhu and
                  Trent Jaeger},
  title        = {On specifying security policies for web documents with an XML-based
                  language},
  booktitle    = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001},
  pages        = {57--65},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/373256.373264},
  doi          = {10.1145/373256.373264},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BertinoCF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/Schneider01,
  author       = {Fred B. Schneider},
  editor       = {Patrick Cousot},
  title        = {Language-Based Security: What's Needed and Why},
  booktitle    = {Static Analysis, 8th International Symposium, {SAS} 2001, Paris, France,
                  July 16-18, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2126},
  pages        = {374},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47764-0\_21},
  doi          = {10.1007/3-540-47764-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/Schneider01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/Scedrov00,
  author       = {Andre Scedrov},
  title        = {A language-based security analysis},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {25},
  number       = {1},
  pages        = {80--81},
  year         = {2000},
  url          = {https://doi.org/10.1145/340855.341016},
  doi          = {10.1145/340855.341016},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/Scedrov00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/WallachAF00,
  author       = {Dan S. Wallach and
                  Andrew W. Appel and
                  Edward W. Felten},
  title        = {{SAFKASI:} a security mechanism for language-based systems},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {341--378},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363520},
  doi          = {10.1145/363516.363520},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/WallachAF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/Kozen99,
  author       = {Dexter Kozen},
  editor       = {Miroslaw Kutylowski and
                  Leszek Pacholski and
                  Tomasz Wierzbicki},
  title        = {Language-Based Security},
  booktitle    = {Mathematical Foundations of Computer Science 1999, 24th International
                  Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1672},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48340-3\_26},
  doi          = {10.1007/3-540-48340-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/Kozen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/Byce93,
  author       = {Ciar{\'{a}}n Bryce},
  editor       = {Bhavani Thuraisingham and
                  Ravi S. Sandhu and
                  T. C. Ting},
  title        = {An Access Control Model or a Parallel Object-Based Programming Language},
  booktitle    = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93}
                  Conference Workshop on Security for Object-Oriented Systems, Washington,
                  DC, USA, 26 September 1993},
  series       = {Workshops in Computing},
  pages        = {166--182},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Wed, 29 Jun 2022 15:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/Byce93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}