Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,220,013 papers from all fields of science
Search
Sign In
Create Free Account
Language-based security
Known as:
Language based security
In computer science, language-based security (LBS) is a set of techniques that may be used to strengthen the security of applications on a high level…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Access control
Automated proof checking
Automated theorem proving
Buffer overflow
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Language-based security analysis of database applications
Raju Halder
International Conference on Computer…
2015
Corpus ID: 1088714
In today's information-age, databases are at the heart of information systems. Unauthorized leakage of confidential database…
Expand
2013
2013
Language-Based Security for Software-Defined Networks
2013
Corpus ID: 15271826
In many settings, including campuses, enterprises, militaries, and datacenters, networks must be shared between entities that…
Expand
2009
2009
Language-based security on Android (abstract only)
A. Chaudhuri
SIGP
2009
Corpus ID: 39669604
In this paper, we initiate a formal study of security on Android: Google's new open-source platform for mobile devices…
Expand
2009
2009
Higher-Order Program Verification and Language-Based Security
Asian Computing Science Conference
2009
Corpus ID: 45514937
Language-based security has been a hot research area of computer security in the last decade. It addresses various concerns about…
Expand
2009
2009
JML- Based formal development of a Java card application for managing medical appointments
Ricardo Rodrigues
2009
Corpus ID: 56374777
variables can be related to concrete variables (or other abstract variables) by a represents clause. A represents clause…
Expand
2009
2009
An empirical evaluation of a language-based security testing technique
Muhammad AboElFotoh
,
T. Dean
,
Ryan Mayor
Conference of the Centre for Advanced Studies on…
2009
Corpus ID: 14234273
Security testing of network applications is an essential task that must be carried out prior to the release of software to the…
Expand
2009
2009
Proceedings 7th International Workshop on Security Issues in Concurrency, SECCO 2009, Bologna, Italy, 5th September 2009
SECCO
2009
Corpus ID: 36759919
Review
2006
Review
2006
Applying the Layered Decision Model to the Design of Language-Based Security Systems
Huaqiang Wei
,
J. Alves-Foss
IEEE International Conference on Information…
2006
Corpus ID: 16243894
Safeguarding practices for networked systems involves decisions in at least three areas: identification of well-defined security…
Expand
2006
2006
An MSLS-EMM for enforcing confidentiality in malicious environments
Bei Wang
,
J. Alves-Foss
Communication, Network, and Information Security
2006
Corpus ID: 15409151
The use of security policy enforcement mechanisms has been a topic in recent literature. Particular focus has been on the class…
Expand
1999
1999
Java Card or How to Cope with the New Security Issues Raised by Open Cards
P. Girard
,
Jean-Louis Lanet
1999
Corpus ID: 15796453
In this paper, we aim to discuss various threats raised by Java Cards at various levels of the system. First, we address the Java…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE