Results 1 - 10
of
61,057
Certification of Programs for Secure Information Flow
, 1977
"... This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing c ..."
Abstract
-
Cited by 490 (1 self)
- Add to MetaCart
This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing
Secure Information Flow by Self-Composition
- UNDER CONSIDERATION FOR PUBLICATION IN MATH. STRUCT. IN COMP. SCIENCE
, 2010
"... Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking or inferenc ..."
Abstract
-
Cited by 138 (15 self)
- Add to MetaCart
Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking
Computationally Secure Information Flow
, 2002
"... This thesis presents a definition and a static program analysis for secure information flow. The definition of secure information flow is not based on non-interference, but on the computational independence of the program's public outputs from its secret inputs. Such definition allows cryptog ..."
Abstract
-
Cited by 7 (5 self)
- Add to MetaCart
This thesis presents a definition and a static program analysis for secure information flow. The definition of secure information flow is not based on non-interference, but on the computational independence of the program's public outputs from its secret inputs. Such definition allows
Nontermination and Secure Information Flow ∗
, 2011
"... In secure information flow analysis, the classic Denning restrictions allow a program’s termination to be affected by the values of its H variables, resulting in potential information leaks. In an effort to quantify such leaks, in this work we study a simple imperative language with random assignmen ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
In secure information flow analysis, the classic Denning restrictions allow a program’s termination to be affected by the values of its H variables, resulting in potential information leaks. In an effort to quantify such leaks, in this work we study a simple imperative language with random
Handling Encryption in an Analysis for Secure Information Flow
- In Proc. European Symp. on Programming, volume 2618 of LNCS
, 2003
"... This paper presents a program analysis for secure information flow. ..."
Abstract
-
Cited by 26 (0 self)
- Add to MetaCart
This paper presents a program analysis for secure information flow.
Secure Information Flow in Orc (DRAFT)
, 2009
"... Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from s ..."
Abstract
- Add to MetaCart
Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from
Arrows for Secure Information Flow
"... This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all
SECURING INFORMATION FLOW AT RUNTIME by
, 2008
"... Information flow security is branch of computer science aimed at regulating of the dissemination of information in programs, that is, to preventing the inadvertent flow of private information handled by computer programs to unauthorized public entities. Although static systems for programming langua ..."
Abstract
- Add to MetaCart
Information flow security is branch of computer science aimed at regulating of the dissemination of information in programs, that is, to preventing the inadvertent flow of private information handled by computer programs to unauthorized public entities. Although static systems for programming
Secure information flow and program logics
- In IEEE Computer Security Foundations Symposium
, 2007
"... We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-line non-interference, multi-level security and flow sensitivity for a while language, we show how typing derivations may ..."
Abstract
-
Cited by 17 (6 self)
- Add to MetaCart
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-line non-interference, multi-level security and flow sensitivity for a while language, we show how typing derivations may
Results 1 - 10
of
61,057