The controlled declassification of secrets has received much attention in research on information-flow security, though mostly for sequential programming lan-guages. In this article, we aim at guaranteeing the security of concurrent pro-grams. We propose the novel security property WHAT&WHERE that allows one to limit what information may be declassified where in a program. We show that our property provides adequate security guarantees independent of the schedul-ing algorithm (which is non-trivial due to the refinement paradox) and present a security type system that reliably enforces the property. In a second scheduler-independence result, we show that an earlier proposed security condition is ade-quate for the same range of schedulers...
AbstractLanguage-based approaches to information security have led to the development of security ty...
The focus of work on information flow security has primarily been on definitions of security in asyn...
A program which has access to your sensitive data presents a security threat. Does the program kee...
Abstract The controlled declassification of secrets has received much attention in research on infor...
Refinement is a relation on system models: a concrete model is a refinement of a more abstract model...
Security assurance is an important challenge for modern computing. Intentional information release (...
Information declassification aims for trusted release of secret information to public environment. E...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Language-based approaches to information security have led to the development of security type syste...
Security assurance is an important challenge for modern computing. Intentional information release (...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
AbstractLanguage-based approaches to information security have led to the development of security ty...
The focus of work on information flow security has primarily been on definitions of security in asyn...
A program which has access to your sensitive data presents a security threat. Does the program kee...
Abstract The controlled declassification of secrets has received much attention in research on infor...
Refinement is a relation on system models: a concrete model is a refinement of a more abstract model...
Security assurance is an important challenge for modern computing. Intentional information release (...
Information declassification aims for trusted release of secret information to public environment. E...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
Language-based approaches to information security have led to the development of security type syste...
Security assurance is an important challenge for modern computing. Intentional information release (...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
AbstractLanguage-based approaches to information security have led to the development of security ty...
The focus of work on information flow security has primarily been on definitions of security in asyn...
A program which has access to your sensitive data presents a security threat. Does the program kee...