Abstract The controlled declassification of secrets has received much attention in research on information-flow security, though mostly for se-quential programming languages. In this article, we aim at guarantee-ing the security of concurrent programs. We propose the novel security property WHAT&WHERE that allows one to limit what information may be declassified where in a program. We show that our property provides adequate security guarantees independent of the scheduling al-gorithm (which is non-trivial due to the refinement paradox) and present a security type system that reliably enforces the property. In a second scheduler-independence result, we show that an earlier proposed security condition is adequate for the same range of sc...
Abstract. We present a general unwinding framework for the definition of information flow security p...
A program which has access to your sensitive data presents a security threat. Does the program kee...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The controlled declassification of secrets has received much attention in research on information-fl...
Information declassification aims for trusted release of secret information to public environment. E...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Refinement is a relation on system models: a concrete model is a refinement of a more abstract model...
Security assurance is an important challenge for modern computing. Intentional information release (...
Language-based approaches to information security have led to the development of security type syste...
AbstractLanguage-based approaches to information security have led to the development of security ty...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Research in information-flow security aims at developing methods to identify undesired information l...
Abstract. We present a general unwinding framework for the definition of information flow security p...
A program which has access to your sensitive data presents a security threat. Does the program kee...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
The controlled declassification of secrets has received much attention in research on information-fl...
Information declassification aims for trusted release of secret information to public environment. E...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Refinement is a relation on system models: a concrete model is a refinement of a more abstract model...
Security assurance is an important challenge for modern computing. Intentional information release (...
Language-based approaches to information security have led to the development of security type syste...
AbstractLanguage-based approaches to information security have led to the development of security ty...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Abstract The first part of the thesis investigates confidentiality, i.e. the problem of determining ...
Research in information-flow security aims at developing methods to identify undesired information l...
Abstract. We present a general unwinding framework for the definition of information flow security p...
A program which has access to your sensitive data presents a security threat. Does the program kee...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...