{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:59:07Z","timestamp":1755035947467},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319127774"},{"type":"electronic","value":"9783319127781"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12778-1_20","type":"book-chapter","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T02:28:17Z","timestamp":1413944897000},"page":"262-274","source":"Crossref","is-referenced-by-count":6,"title":["Information-Flow Analysis of Hibernate Query Language"],"prefix":"10.1007","author":[{"given":"Agostino","family":"Cortesi","sequence":"first","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Bauer, C., King, G.: Hibernate in Action. Manning Publications Co. (2004)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, C., King, G.: Java Persistence with Hibernate. Manning Publications Co. (2006)","DOI":"10.3139\/9783446413825.fm"},{"key":"20_CR3","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1145\/512950.512973","volume-title":"Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 238\u2013252. ACM Press, Los Angeles (1977)"},{"key":"20_CR4","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1145\/567752.567778","volume-title":"Proceedings of the 6th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages","author":"P. Cousot","year":"1979","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Proceedings of the 6th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 269\u2013282. ACM Press, San Antonio (1979)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019, 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"key":"20_CR6","unstructured":"Elliott, J., O\u2019Brien, T., Fowler, R.: Harnessing Hibernate, 1st edn. O\u2019Reilly (2008)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.cl.2011.10.004","volume":"38","author":"R. Halder","year":"2012","unstructured":"Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Computer Languages, Systems & Structures\u00a038, 123\u2013157 (2012)","journal-title":"Computer Languages, Systems & Structures"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1145\/2554850.2554862","volume-title":"Proceedings of the 29th Annual ACM Symposium on Applied Computing (SAC 2014)","author":"R. Halder","year":"2014","unstructured":"Halder, R., Zanioli, M., Cortesi, A.: Information leakage analysis of database query languages. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing (SAC 2014), March 24-28, pp. 813\u2013820. ACM Press, Gyeongju (2014)"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C. Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. International Journal of Information Security\u00a08, 399\u2013422 (2009)","journal-title":"International Journal of Information Security"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/571681.571683","volume":"27","author":"B. Li","year":"2002","unstructured":"Li, B.: Analyzing information-flow in java program based on slicing technique. SIGSOFT Software Engineering Notes\u00a027, 98\u2013103 (2002)","journal-title":"SIGSOFT Software Engineering Notes"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cl.2005.01.001","volume":"35","author":"F. Logozzo","year":"2009","unstructured":"Logozzo, F.: Class invariants as abstract interpretation of trace semantics. Computer Languages, Systems & Structures\u00a035, 100\u2013142 (2009)","journal-title":"Computer Languages, Systems & Structures"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/292540.292561","volume-title":"Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"A.C. Myers","year":"1999","unstructured":"Myers, A.C.: Jflow: Practical mostly-static information flow control. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 228\u2013241. ACM Press, San Antonio (1999)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/596980.596983","volume":"25","author":"F. Pottier","year":"2003","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ml. ACM Transactions on Programming Languages and Systems\u00a025, 117\u2013158 (2003)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021, 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"20_CR15","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1134744.1134758","volume-title":"Proceedings of the Workshop on Programming Languages and Analysis for Security","author":"S.F. Smith","year":"2006","unstructured":"Smith, S.F., Thober, M.: Refactoring programs to secure information flows. In: Proceedings of the Workshop on Programming Languages and Analysis for Security, pp. 75\u201384. ACM Press, Canada (2006)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/978-3-642-18381-2_45","volume-title":"SOFSEM 2011: Theory and Practice of Computer Science","author":"M. Zanioli","year":"2011","unstructured":"Zanioli, M., Cortesi, A.: Information leakage analysis by abstract interpretation. In: \u010cern\u00e1, I., Gyim\u00f3thy, T., Hromkovi\u010d, J., Jefferey, K., Kr\u00e1lovi\u0107, R., Vukoli\u0107, M., Wolf, S. (eds.) SOFSEM 2011. LNCS, vol.\u00a06543, pp. 545\u2013557. Springer, Heidelberg (2011)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Zanioli, M., Ferrara, P., Cortesi, A.: Sails: Static analysis of information leakage with sample. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC 2012), pp. 1308\u20131313. ACM Press, Trento (2012)","DOI":"10.1145\/2245276.2231983"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12778-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T10:37:18Z","timestamp":1650451038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12778-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319127774","9783319127781"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12778-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}