{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:49:48Z","timestamp":1773931788148,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319498058","type":"print"},{"value":"9783319498065","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_8","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"151-171","source":"Crossref","is-referenced-by-count":9,"title":["Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications"],"prefix":"10.1007","author":[{"given":"Angshuman","family":"Jana","sequence":"first","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"8_CR1","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-81-322-2650-5_4","volume-title":"Advanced Computing and Systems for Security","author":"BK Ahuja","year":"2016","unstructured":"Ahuja, B.K., Jana, A., Swarnkar, A., Halder, R.: On preventing SQL injection attacks. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 395, pp. 49\u201364. Springer, Heidelberg (2016). doi: 10.1007\/978-81-322-2650-5_4"},{"key":"8_CR2","unstructured":"Bagnara, R., Hill, P.M., Zaffanella, E.: The ppl: toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems. Technical report Dipartimento di Matematica, Universit\u00e0 di Parma, Italy (2006)"},{"key":"8_CR3","unstructured":"Baralis, E., Widom, J.: An algebraic approach to rule analysis in expert database systems (1994)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chen, L., Min\u00e8, A., Cousot, P.: A sound floating-point polyhedra abstract domain. In: Proceeding of the PLS, pp. 3\u201318 (2008)","DOI":"10.1007\/978-3-540-89330-1_2"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Cheney, J., Ahmed, A., Acar, U.A.: Provenance as dependency analysis. In: Proceeding of the ICDPL, pp. 138\u2013152 (2007)","DOI":"10.1007\/978-3-540-75987-4_10"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Chernikova, N.V.: Algorithm for discovering the set of all the solutions of a linear programming problem, vol. 8, pp. 282\u2013293 (1968)","DOI":"10.1016\/0041-5553(68)90115-8"},{"key":"8_CR7","unstructured":"Cousot, P.: Web page on abstract interpretation. http:\/\/www.di.ens.fr\/cousot\/AI\/"},{"key":"8_CR8","unstructured":"Cousot, P., Cousot, R.: A gentle introduction to formal verification of computer systems by abstract interpretation. NATO Science Series III: Comp. and Syst. Sciences"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: Proceeding of the POPL 1978, pp. 84\u201396 (1978)","DOI":"10.1145\/512760.512770"},{"issue":"3","key":"8_CR10","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1978","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Sys. 9(3), 319\u2013349 (1978)","journal-title":"ACM Trans. Program. Lang. Sys."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Henzinger, T.A., Singh, V.: Software transactional memory on relaxed memory models. In: Computer Aided Verification, vol. 5643, pp. 321\u2013336 (2009)","DOI":"10.1007\/978-3-642-02658-4_26"},{"key":"8_CR12","first-page":"123","volume":"38","author":"R Halder","year":"2012","unstructured":"Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Comput. Lang. Syst. Struct. 38, 123\u2013157 (2012)","journal-title":"Comput. Lang. Syst. Struct."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Halder, R., Cortesi, A.: Abstract program slicing of database query languages. In: Proceeding of the Applied Computing, pp. 838\u2013845. ACM (2013)","DOI":"10.1145\/2480362.2480524"},{"key":"8_CR14","first-page":"23","volume":"23","author":"R Halder","year":"2016","unstructured":"Halder, R., Jana, A., Cortesi, A.: Data leakage analysis of the hibernate query language on a propositional formulae domain. Trans. Large-Scale Data- Knowl.-Centered Syst. 23, 23\u201344 (2016)","journal-title":"Trans. Large-Scale Data- Knowl.-Centered Syst."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-11747-3_4","volume-title":"Engineering Secure Software and Systems","author":"C Hammer","year":"2010","unstructured":"Hammer, C.: Experiences with PDG-based IFC. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 44\u201360. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-11747-3_4"},{"issue":"1","key":"8_CR16","first-page":"26","volume":"12","author":"S Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. ACM Trans. PLS 12(1), 26\u201360 (1990)","journal-title":"ACM Trans. PLS"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-24369-6_22","volume-title":"Computer Information Systems and Industrial Management","author":"A Jana","year":"2015","unstructured":"Jana, A., Halder, R., Chaki, N., Cortesi, A.: Policy-based slicing of hibernate query language. In: Saeed, K., Homenda, W. (eds.) CISIM 2015. LNCS, vol. 9339, pp. 267\u2013281. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24369-6_22"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-319-23862-3_12","volume-title":"Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques","author":"A Jana","year":"2015","unstructured":"Jana, A., Halder, R., Cortesi, A.: Verification of hibernate query language by abstract interpretation. In: He, X., Gao, X., Zhang, Y., Zhou, Z.-H., Liu, Z.-Y., Fu, B., Hu, F., Zhang, Z. (eds.) IScIDE 2015. LNCS, vol. 9243, pp. 116\u2013128. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23862-3_12"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/978-3-642-02658-4_52","volume-title":"Computer Aided Verification","author":"B Jeannet","year":"2009","unstructured":"Jeannet, B., Min\u00e9, A.: Apron: a library of numerical abstract domains for static analysis. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 661\u2013667. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02658-4_52"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Johnson, A., Waye, L., Moore, S., Chong, S.: Exploring and enforcing security guarantees via program dependence graphs. In: Proceeding of the 36th ACM SIGPLAN Conference on PLDI, PLDI 2015, pp. 291\u2013302. ACM (2015)","DOI":"10.1145\/2813885.2737957"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kelner, J.A., Spielman, D.A.: A randomized polynomial-time simplex algorithm for linear programming. In: Proceeding of the Theory of Computing, pp. 51\u201360. ACM (2006)","DOI":"10.1145\/1132516.1132524"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Larsen, L., Harrold, M.J.: Slicing object-oriented software. In: Proceeding of the ICSE, pp. 495\u2013505. IEEE CS (1996)","DOI":"10.1109\/ICSE.1996.493444"},{"key":"8_CR23","unstructured":"Levy, A.Y., Sagiv, Y.: Queries independent of updates. In: Proceeding of the VLDB, pp. 171\u2013181 (1993)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Mastroeni, I., Zanardini, D.: Data dependencies and program slicing: from syntax to abstract semantics. In: Proceeding of the Partial Evaluation and Semantics-Based Program Manipulation, pp. 125\u2013134 (2008)","DOI":"10.1145\/1328408.1328428"},{"issue":"1","key":"8_CR25","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/2422.322418","volume":"31","author":"N Megiddo","year":"1984","unstructured":"Megiddo, N.: Linear programming in linear time when the dimension is fixed. J. ACM 31(1), 114\u2013127 (1984)","journal-title":"J. ACM"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Millstein, T., Levy, A., Friedman, M.: Query containment for data integration systems. In: Proceeding of the PDS, pp. 67\u201375. ACM (2000)","DOI":"10.1145\/335168.335208"},{"issue":"1","key":"8_CR27","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10990-006-8609-1","volume":"19","author":"A Min\u00e8","year":"2006","unstructured":"Min\u00e8, A.: The octagon abstract domain. Higher Order Symbol. Comput. 19(1), 31\u2013100 (2006). http:\/\/www.astreeensfr\/","journal-title":"Higher Order Symbol. Comput."},{"key":"8_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"issue":"5","key":"8_CR29","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1145\/390011.808263","volume":"19","author":"KJ Ottenstein","year":"1984","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. ACM SIGPLAN Notices 19(5), 177\u2013184 (1984)","journal-title":"ACM SIGPLAN Notices"},{"key":"8_CR30","first-page":"2003","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. SAC 21, 2003 (2003)","journal-title":"IEEE J. SAC"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-33260-9_23","volume-title":"Computer Information Systems and Industrial Management","author":"S Sen","year":"2012","unstructured":"Sen, S., Dutta, A., Cortesi, A., Chaki, N.: A new scale for attribute dependency in large database systems. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 266\u2013277. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33260-9_23"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Tsahhirov, I., Laud, P.: Application of dependency graphs to security protocol analysis. In: Proceeding of the 3rd Symposium on Trustworthy Global Computing, pp. 294\u2013311, Sophia-Antipolis, France, 5\u20136 Nov 2007","DOI":"10.1007\/978-3-540-78663-4_20"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Willmor, D., Embury, S.M., Shao, J.: Program slicing in the presence of a database state. In: Proceeding of the IEEE ICSM, pp. 448\u2013452 (2004)","DOI":"10.1109\/ICSM.2004.1357833"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T22:11:17Z","timestamp":1568585477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}