{"id":"https://openalex.org/W2069534213","doi":"https://doi.org/10.1145/1566445.1566537","title":"An overview of programming language based security","display_name":"An overview of programming language based security","publication_year":2009,"publication_date":"2009-03-19","ids":{"openalex":"https://openalex.org/W2069534213","doi":"https://doi.org/10.1145/1566445.1566537","mag":"2069534213"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1566445.1566537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005248061","display_name":"Jaime Ni\u00f1o","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"funder","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jaime Ni\u00f1o","raw_affiliation_strings":["University of New Orleans, New Orleans, LA"],"affiliations":[{"raw_affiliation_string":"University of New Orleans, New Orleans, LA","institution_ids":["https://openalex.org/I192396691"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5005248061"],"corresponding_institution_ids":["https://openalex.org/I192396691"],"apc_list":null,"apc_paid":null,"fwci":0.219,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.224763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":64,"max":71},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/c-programming-language","display_name":"C programming language","score":0.58513653},{"id":"https://openalex.org/keywords/fourth-generation-programming-language","display_name":"Fourth-generation programming language","score":0.4344353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78962064},{"id":"https://openalex.org/C2986567400","wikidata":"https://www.wikidata.org/wiki/Q15777","display_name":"C programming language","level":3,"score":0.58513653},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.53040683},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4628775},{"id":"https://openalex.org/C34165917","wikidata":"https://www.wikidata.org/wiki/Q188267","display_name":"Programming paradigm","level":2,"score":0.43909755},{"id":"https://openalex.org/C145628200","wikidata":"https://www.wikidata.org/wiki/Q238137","display_name":"Fourth-generation programming language","level":5,"score":0.4344353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42950556},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.41124272},{"id":"https://openalex.org/C50033165","wikidata":"https://www.wikidata.org/wiki/Q15712089","display_name":"Inductive programming","level":3,"score":0.18374619},{"id":"https://openalex.org/C96315309","wikidata":"https://www.wikidata.org/wiki/Q5508829","display_name":"Functional logic programming","level":4,"score":0.14096329},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.076679975}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1566445.1566537","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.54,"display_name":"Quality education"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1497405692","https://openalex.org/W1506258479","https://openalex.org/W1523444877","https://openalex.org/W1550189296","https://openalex.org/W1564747695","https://openalex.org/W1593700268","https://openalex.org/W1599545360","https://openalex.org/W1614902435","https://openalex.org/W1825457006","https://openalex.org/W1902364372","https://openalex.org/W1938417886","https://openalex.org/W1973326708","https://openalex.org/W1989449504","https://openalex.org/W2034711041","https://openalex.org/W2038315427","https://openalex.org/W2065076704","https://openalex.org/W2079029390","https://openalex.org/W2095881341","https://openalex.org/W2122049982","https://openalex.org/W2140611647","https://openalex.org/W2141365240","https://openalex.org/W2142837069","https://openalex.org/W2143265472","https://openalex.org/W2143436119","https://openalex.org/W2168965633","https://openalex.org/W2741197453","https://openalex.org/W3003829247","https://openalex.org/W32499142","https://openalex.org/W4234020632","https://openalex.org/W4237548148"],"related_works":["https://openalex.org/W3203150237","https://openalex.org/W2954318817","https://openalex.org/W2535899623","https://openalex.org/W2304392242","https://openalex.org/W2133376498","https://openalex.org/W2072152184","https://openalex.org/W2013673681","https://openalex.org/W2010145286","https://openalex.org/W1968275544","https://openalex.org/W134217928"],"abstract_inverted_index":{"This":[0],"paper":[1],"provides":[2],"a":[3],"survey":[4],"of":[5,29,46],"security":[6,40],"features":[7],"in":[8],"modern":[9],"programming":[10],"languages":[11],"for":[12,26],"Computer":[13],"Science":[14],"instructors.":[15],"We":[16],"present":[17],"the":[18,27,56],"role":[19],"that":[20,42,50],"type":[21],"safety":[22],"and":[23,32],"capabilities":[24],"provide":[25],"building":[28],"secure":[30],"systems,":[31],"how":[33],"language":[34],"systems":[35],"allow":[36],"designers":[37],"to":[38],"model":[39],"issues":[41],"once":[43],"were":[44],"part-and-parcel":[45],"Operating":[47],"Systems,":[48],"or":[49],"can":[51],"not":[52],"be":[53],"modeled":[54],"by":[55],"latter.":[57]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2069534213","counts_by_year":[],"updated_date":"2025-03-23T12:44:34.048098","created_date":"2016-06-24"}