Cited By
View all- Halder R(2015)Language-based security analysis of database applicationsProceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)10.1109/C3IT.2015.7060109(1-4)Online publication date: Feb-2015
- Halder RJana ACortesi A(2015)Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae DomainTransactions on Large-Scale Data- and Knowledge-Centered Systems XXIII - Volume 948010.1007/978-3-662-49175-1_2(23-44)Online publication date: 1-Sep-2015
- Cortesi AFerrara PPistoia MTripp O(2015)Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile ApplicationsProceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 893110.1007/978-3-662-46081-8_4(61-79)Online publication date: 12-Jan-2015
- Show More Cited By