Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software cor-rectly enforces its information release policy. Our approach has two parts. First, an information release policy is speci-fied as a security automaton written in a new language called AIR. Second, we enforce an AIR policy by translating it into an API for programs written in λAIR, a core formalism for a functional programming language. λAIR uses a novel com-bination of dependent, affine, and singleton types to ensure that the API is used correctly. As a consequence we can cer-tify that programs written in λAI...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Many organizations specify complex information release policies to describe the terms under which se...
Many computer systems have a functional requirement to release information. Such requirements are an...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforc...
This paper studies the problem of securing information release in dynamic languages. We propose (i) ...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Security assurance is an important challenge for modern computing. Intentional information release (...
\u3cp\u3eGuaranteeing that information processed in computing systems remains confidential is vital ...
Language-based information flow security is a promising approach for enforcement of strong security ...
Decentralization is a major challenge for secure computing. In a decentralized setting, principals a...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Many organizations specify complex information release policies to describe the terms under which se...
Many computer systems have a functional requirement to release information. Such requirements are an...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Abstract. Proving software free of security bugs is hard. Programming language support to ensure tha...
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforc...
This paper studies the problem of securing information release in dynamic languages. We propose (i) ...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Security assurance is an important challenge for modern computing. Intentional information release (...
\u3cp\u3eGuaranteeing that information processed in computing systems remains confidential is vital ...
Language-based information flow security is a promising approach for enforcement of strong security ...
Decentralization is a major challenge for secure computing. In a decentralized setting, principals a...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...
Guaranteeing that information processed in computing systems remains confidential is vital for many ...