{"id":"https://openalex.org/W2020408011","doi":"https://doi.org/10.1145/1814217.1814222","title":"Restricted delegation and revocation in language-based security","display_name":"Restricted delegation and revocation in language-based security","publication_year":2010,"publication_date":"2010-06-10","ids":{"openalex":"https://openalex.org/W2020408011","doi":"https://doi.org/10.1145/1814217.1814222","mag":"2020408011"},"language":"en","primary_location":{"id":"doi:10.1145/1814217.1814222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1814217.1814222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110034966","display_name":"Dr. Md. Kamrul Hassan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165434","display_name":"National Telecommunications Institute","ror":"https://ror.org/05g82f642","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210165434"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"D. Hassan","raw_affiliation_strings":["National Telecommunication Institute, Egypt"],"affiliations":[{"raw_affiliation_string":"National Telecommunication Institute, Egypt","institution_ids":["https://openalex.org/I4210165434"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101493818","display_name":"Mohammad Reza Mousavi","orcid":"https://orcid.org/0000-0002-4869-6794"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"M. R. Mousavi","raw_affiliation_strings":["TU/Eindhoven, The Netherlands","TU Eindhoven, the Netherlands"],"affiliations":[{"raw_affiliation_string":"TU/Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"TU Eindhoven, the Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040487816","display_name":"Michel Reniers","orcid":"https://orcid.org/0000-0002-9283-4074"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"M. A. Reniers","raw_affiliation_strings":["TU/Eindhoven, The Netherlands","TU Eindhoven, the Netherlands"],"affiliations":[{"raw_affiliation_string":"TU/Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"TU Eindhoven, the Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110034966"],"corresponding_institution_ids":["https://openalex.org/I4210165434"],"apc_list":null,"apc_paid":null,"fwci":0.9021,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79724731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.9004482626914978},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8087669014930725},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7710412740707397},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.7573239207267761},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.660383939743042},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6498032808303833},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5208992958068848},{"id":"https://openalex.org/keywords/operational-semantics","display_name":"Operational semantics","score":0.499678373336792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46423426270484924},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.42720815539360046},{"id":"https://openalex.org/keywords/denotational-semantics","display_name":"Denotational semantics","score":0.41065794229507446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3236190676689148}],"concepts":[{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.9004482626914978},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8087669014930725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7710412740707397},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.7573239207267761},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.660383939743042},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6498032808303833},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5208992958068848},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.499678373336792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46423426270484924},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.42720815539360046},{"id":"https://openalex.org/C207648694","wikidata":"https://www.wikidata.org/wiki/Q1189746","display_name":"Denotational semantics","level":4,"score":0.41065794229507446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3236190676689148},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1814217.1814222","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1814217.1814222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/88351d09-e9a4-498e-9f96-37ed34d21232","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/88351d09-e9a4-498e-9f96-37ed34d21232","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hassan, D, Mousavi, M R & Reniers, M A 2010, Restricted delegation and revocation in language-based security (Position paper). in Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2010, Toronto, Canada, June 10, 2010). Association for Computing Machinery, Inc., New York NY, pp. 5-1/7. https://doi.org/10.1145/1814217.1814222","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/88351d09-e9a4-498e-9f96-37ed34d21232","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/88351d09-e9a4-498e-9f96-37ed34d21232","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2010, Toronto, Canada, June 10, 2010), 5 - 1/7","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1503761302","https://openalex.org/W1531820677","https://openalex.org/W1597778235","https://openalex.org/W1819958245","https://openalex.org/W1966354044","https://openalex.org/W1976334587","https://openalex.org/W1977764760","https://openalex.org/W1998003182","https://openalex.org/W2000952251","https://openalex.org/W2075849836","https://openalex.org/W2095840868","https://openalex.org/W2111487235","https://openalex.org/W2122049982","https://openalex.org/W2138158983","https://openalex.org/W2144973245","https://openalex.org/W2154564703","https://openalex.org/W2158126684","https://openalex.org/W2158642393","https://openalex.org/W2162755110","https://openalex.org/W2168686464","https://openalex.org/W2914260883","https://openalex.org/W4249903311"],"related_works":["https://openalex.org/W115332106","https://openalex.org/W1591695585","https://openalex.org/W3183911098","https://openalex.org/W4238454263","https://openalex.org/W2559470891","https://openalex.org/W4245844877","https://openalex.org/W4248360724","https://openalex.org/W1975904519","https://openalex.org/W4386088672","https://openalex.org/W3125255130"],"abstract_inverted_index":{"In":[0,18],"this":[1,22],"paper,":[2],"we":[3,20],"introduce":[4],"a":[5,32],"notion":[6,23],"of":[7,26,52,65,71,74,83],"restricted":[8],"revocable":[9],"delegation":[10],"and":[11,28],"study":[12],"its":[13],"consequences":[14],"in":[15,47,80],"language-based":[16],"security.":[17],"particular,":[19],"add":[21],"by":[24],"means":[25],"delegate":[27],"revoke":[29],"commands":[30],"to":[31],"simple":[33],"imperative":[34],"programming":[35,45],"language.":[36],"We":[37,55],"then":[38],"define":[39],"an":[40],"operational":[41],"semantics":[42],"for":[43],"our":[44,58],"language,":[46],"the":[48,62,66,75,81],"Natural":[49],"Semantics":[50],"style":[51],"Gilles":[53],"Kahn.":[54],"briefly":[56],"discuss":[57],"initial":[59],"ideas":[60],"about":[61],"security":[63],"properties":[64],"semantics,":[67],"which":[68],"are":[69],"extensions":[70],"existing":[72],"variations":[73],"renowned":[76],"non-interference":[77],"property,":[78],"e.g.,":[79],"context":[82],"delimited":[84],"information":[85],"release.":[86]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
