{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:40:25Z","timestamp":1778344825030,"version":"3.51.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032024053","type":"print"},{"value":"9783032024060","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:00:00Z","timestamp":1755993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:00:00Z","timestamp":1755993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02406-0_24","type":"book-chapter","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T09:26:24Z","timestamp":1755941184000},"page":"337-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Refining Dependency Analysis in\u00a0Database-Driven Programs Using Abstract Interpretation"],"prefix":"10.1007","author":[{"given":"Anwesha","family":"Kashyap","sequence":"first","affiliation":[]},{"given":"Angshuman","family":"Jana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"issue":"3","key":"24_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1504\/IJTMCC.2016.081846","volume":"3","author":"MI Alam","year":"2016","unstructured":"Alam, M.I., Halder, R.: Refining dependencies for information flow analysis of database applications. Int. J. Trust Manage. Comput. Commun. 3(3), 193\u2013223 (2016)","journal-title":"Int. J. Trust Manage. Comput. Commun."},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.ijar.2017.07.010","volume":"90","author":"L Bertossi","year":"2017","unstructured":"Bertossi, L., Salimi, B.: Causes for query answers from databases: datalog abduction, view-updates, and integrity constraints. Int. J. Approximate Reasoning 90, 226\u2013252 (2017)","journal-title":"Int. J. Approximate Reasoning"},{"key":"24_CR3","unstructured":"Cousot, P.: Principles of Abstract Interpretation. MIT Press, Cambridge (2021)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the POPL 1977, pp. 238\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"issue":"3","key":"24_CR5","first-page":"319","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. PLAS 9(3), 319\u2013349 (1987)","journal-title":"ACM Trans. PLAS"},{"key":"24_CR6","unstructured":"Galindo, C., P\u00e9rez, S., Silva, J.: Data dependencies in object-oriented programs. In: Workshop on Tools for Program Analysis (2020)"},{"issue":"6","key":"24_CR7","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399\u2013422 (2009)","journal-title":"Int. J. Inf. Secur."},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Jana, A.: A static analysis approach to detect confidentiality leakage of database query languages. In: International Conference on Intelligent Systems Design and Applications, pp. 794\u2013804. Springer (2020)","DOI":"10.1007\/978-3-030-71187-0_73"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Jana, A., Alam, M.I., Halder, R.: A symbolic model checker for database programs. In: ICSOFT, pp. 381\u2013388 (2018)","DOI":"10.5220\/0006913003810388"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-49806-5_8","volume-title":"Information Systems Security","author":"A Jana","year":"2016","unstructured":"Jana, A., Halder, R.: Defining abstract semantics for static dependence analysis of relational database applications. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 151\u2013171. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49806-5_8"},{"issue":"5","key":"24_CR11","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TSE.2018.2861707","volume":"46","author":"A Jana","year":"2018","unstructured":"Jana, A., Halder, R., Abhishekh, K.V., Ganni, S.D., Cortesi, A.: Extending abstract interpretation to dependency analysis of database applications. IEEE Trans. Software Eng. 46(5), 463\u2013494 (2018)","journal-title":"IEEE Trans. Software Eng."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Jana, A., Kashyap, A.: Confidentiality leakage analysis of database-driven applications. In: Advances in Computing and Data Sciences, ICACDS 2021, Nashik, India, pp. 313\u2013323. Springer (2021)","DOI":"10.1007\/978-3-030-88244-0_30"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Kashyap, A., Jana, A.: Integrity constraint verification of structured query language by abstract interpretation. In: 2022 OITS International Conference on Information Technology (OCIT), pp.\u00a01\u20136. IEEE (2022)","DOI":"10.1109\/OCIT56763.2022.00091"},{"key":"24_CR14","first-page":"16","volume":"15","author":"A Kashyap","year":"2023","unstructured":"Kashyap, A., Jana, A.: Extending semantic based techniques for policy-based slicing of database program. Int. J. Comput. Inf. Syst. Ind. Manage. Appl. 15, 16\u201316 (2023)","journal-title":"Int. J. Comput. Inf. Syst. Ind. Manage. Appl."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kashyap, A., Jana, A.: A static analysis approach to verify data integrity of web-based software systems. In: 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp.\u00a01\u20136. IEEE (2024)","DOI":"10.1109\/ANTS63515.2024.10898331"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Kelner, J.A., Spielman, D.A.: A randomized polynomial-time simplex algorithm for linear programming. In: Proceedings of the Thirty-Eighth Annual ACM Symposium on Theory of Computing, pp. 51\u201360 (2006)","DOI":"10.1145\/1132516.1132524"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Mastroeni, I., Zanardini, D.: Data dependencies and program slicing: from syntax to abstract semantics. In: Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, pp. 125\u2013134 (2008)","DOI":"10.1145\/1328408.1328428"},{"key":"24_CR18","unstructured":"Rival, X., Yi, K.: Introduction to Static Analysis: An Abstract Interpretation Perspective. MIT Press, Cambridge (2020)"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Rule-Based, A.U.S.: Policy-based code slicing of database application using semantic rule-based approach. In: Innovations in Bio-Inspired Computing and Applications: Proceedings of the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA), 2022, vol.\u00a0649, p.\u00a0392. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-27499-2_37"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Ko, R., Zhang, Y., Yang, Y., Lin, Z.: Taintmini: detecting flow of sensitive data in mini-programs with static taint analysis. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 932\u2013944. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00086"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Willmor, D., Embury, S.M., Shao, J.: Program slicing in the presence of database state. In: 20th IEEE International Conference on Software Maintenance, 2004. Proceedings, pp. 448\u2013452. IEEE (2004)","DOI":"10.1109\/ICSM.2004.1357833"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Wu, M., Wang, C.: Abstract interpretation under speculative execution. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 802\u2013815 (2019)","DOI":"10.1145\/3314221.3314647"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02406-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:29:06Z","timestamp":1757449746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02406-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"ISBN":["9783032024053","9783032024060"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02406-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"24 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fukuoka","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pb.edu.pl\/cisim\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}