This paper presents a certification mechanism for verifying the secure flow of information through a pro-gram. Because it exploits the properties of a lattice structure among security classes, the procedure is suf-ficiently simple that it can easily be included in the analysis phase of most existing compilers. Appropriate semantics are presented and proved correct. An impor-tant application is the confinement problem: The mechanism can prove that a program cannot cause supposedly nonconfidential results to depend on confi-dential input data
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Language-based approaches to information security have led to the development of security type syste...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
This paper presents a certification mechanism for verifying the secure flow of information through a...
This paper investigates mechanisms that guarantee secure information flow in a computer system. Thes...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
This work is organized in seven chapters. The introduction, Chapter 1, illus-trates the context and ...
When a computer program requires legitimate access to confidential data, the question arises whether...
If we classify variables in a program into various security levels, then a secure information flow a...
We give a formal definition of the notion of information flow for a simple guarded command language....
AbstractA classic problem in security is that of checking that a program has secure information flow...
An approach enabling end-users to verify that a downloaded untrusted code will not leak confidential...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
We present a method based on abstract interpretation to check secure information flow in programs wi...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Language-based approaches to information security have led to the development of security type syste...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
This paper presents a certification mechanism for verifying the secure flow of information through a...
This paper investigates mechanisms that guarantee secure information flow in a computer system. Thes...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
This work is organized in seven chapters. The introduction, Chapter 1, illus-trates the context and ...
When a computer program requires legitimate access to confidential data, the question arises whether...
If we classify variables in a program into various security levels, then a secure information flow a...
We give a formal definition of the notion of information flow for a simple guarded command language....
AbstractA classic problem in security is that of checking that a program has secure information flow...
An approach enabling end-users to verify that a downloaded untrusted code will not leak confidential...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
We present a method based on abstract interpretation to check secure information flow in programs wi...
Type systems for secure information flow aim to prevent a program from leaking information from vari...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Language-based approaches to information security have led to the development of security type syste...
Information flow control mechanisms detect and prevent transfers of information which violate the se...