Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and en-force access control and information flow policies. Most of these security-typed languages have been presented as new, stand-alone language designs. In this paper, we instead show how to embed a security-typed programming language within an existing depen-dently typed programming language, Agda. This language design strategy allows us to inherit both the metatheoretic properties, such as type safety, and the implementation of the host language. Our embedded language accounts for the major features of these ex-isting security-typed programming languages, including decentral-ized access control, stateful and dynamic policies...
Abstract. Language-based security leverages program analysis and pro-gram rewriting to enforce secur...
Language-based security leverages program analysis and program rewriting to enforce security policie...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Certi ed code is a general mechanism for enforcing se-curity properties. In this paradigm, untrusted...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforc...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Language-based security leverages program analysis and program rewriting to enforce security policie...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Abstract. Language-based security leverages program analysis and pro-gram rewriting to enforce secur...
Language-based security leverages program analysis and program rewriting to enforce security policie...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Certi ed code is a general mechanism for enforcing se-curity properties. In this paradigm, untrusted...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforc...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Language-based security leverages program analysis and program rewriting to enforce security policie...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Abstract. Language-based security leverages program analysis and pro-gram rewriting to enforce secur...
Language-based security leverages program analysis and program rewriting to enforce security policie...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...