• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 61,057
Next 10 →

Certification of Programs for Secure Information Flow

by Dorothy E. Denning, Peter J. Denning , 1977
"... This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing c ..."
Abstract - Cited by 490 (1 self) - Add to MetaCart
This paper presents a certification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis phase of most existing

A lattice model of secure information flow,”

by Dorothy E Denning - Communications of the ACM, , 1976
"... ..."
Abstract - Cited by 703 (2 self) - Add to MetaCart
Abstract not found

Secure Information Flow by Self-Composition

by Gilles Barthe, Pedro R. D’Argenio, Tamara Rezk - UNDER CONSIDERATION FOR PUBLICATION IN MATH. STRUCT. IN COMP. SCIENCE , 2010
"... Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking or inferenc ..."
Abstract - Cited by 138 (15 self) - Add to MetaCart
Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking

Computationally Secure Information Flow

by Peeter Laud , 2002
"... This thesis presents a definition and a static program analysis for secure information flow. The definition of secure information flow is not based on non-interference, but on the computational independence of the program's public outputs from its secret inputs. Such definition allows cryptog ..."
Abstract - Cited by 7 (5 self) - Add to MetaCart
This thesis presents a definition and a static program analysis for secure information flow. The definition of secure information flow is not based on non-interference, but on the computational independence of the program's public outputs from its secret inputs. Such definition allows

Nontermination and Secure Information Flow ∗

by Geoffrey Smith, Rafael Alpízar , 2011
"... In secure information flow analysis, the classic Denning restrictions allow a program’s termination to be affected by the values of its H variables, resulting in potential information leaks. In an effort to quantify such leaks, in this work we study a simple imperative language with random assignmen ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
In secure information flow analysis, the classic Denning restrictions allow a program’s termination to be affected by the values of its H variables, resulting in potential information leaks. In an effort to quantify such leaks, in this work we study a simple imperative language with random

Handling Encryption in an Analysis for Secure Information Flow

by Peeter Laud - In Proc. European Symp. on Programming, volume 2618 of LNCS , 2003
"... This paper presents a program analysis for secure information flow. ..."
Abstract - Cited by 26 (0 self) - Add to MetaCart
This paper presents a program analysis for secure information flow.

Secure Information Flow in Orc (DRAFT)

by unknown authors , 2009
"... Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from s ..."
Abstract - Add to MetaCart
Secure information flow attempts to verify that programs do not leak information to unauthorized third parties. Previous approaches to secure information flow have considered classical sequential languages and concurrent languages based on channels. In this work, we demonstrate how techniques from

Arrows for Secure Information Flow

by Peng Li, Steve Zdancewic
"... This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all

SECURING INFORMATION FLOW AT RUNTIME by

by Paritosh Shroff, Andreas Terzis, The Johns , 2008
"... Information flow security is branch of computer science aimed at regulating of the dissemination of information in programs, that is, to preventing the inadvertent flow of private information handled by computer programs to unauthorized public entities. Although static systems for programming langua ..."
Abstract - Add to MetaCart
Information flow security is branch of computer science aimed at regulating of the dissemination of information in programs, that is, to preventing the inadvertent flow of private information handled by computer programs to unauthorized public entities. Although static systems for programming

Secure information flow and program logics

by Lennart Beringer, Martin Hofmann - In IEEE Computer Security Foundations Symposium , 2007
"... We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-line non-interference, multi-level security and flow sensitivity for a while language, we show how typing derivations may ..."
Abstract - Cited by 17 (6 self) - Add to MetaCart
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-line non-interference, multi-level security and flow sensitivity for a while language, we show how typing derivations may
Next 10 →
Results 1 - 10 of 61,057
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University