Data-intensive applications as popularised by cloud computing raise many security challenges, due to the large number of remote users involved and multi-tenancy. Fre-quently, the security compartment associated to data stored in shared containers, such as database tables, is not determined by the static structure of the database schema, but depends on runtime data values, as required to ensure so-called "row-level " security. In this paper, we investigate a programming language approach to these issues, based on a λ-calculus extended with data manipulation primitives. We develop a type-based infor-mation flow analysis introducing a notion of value-indexed security labels, representing value-indexed security levels, or compartments...
This paper explores information flow control in systems in which the security classes of data can v...
We explore the logical underpinnings of higher-order, security-typed languages with mutable state. O...
This paper explores information flow control in systems in which the security classes of data can va...
Data-intensive applications as popularised by cloud computing raise many security challenges, due to...
Information systems are widespread and used by anyone with computing devices as well as corporation...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
AbstractA classic problem in security is that of checking that a program has secure information flow...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
AbstractWe describe a type system for the Xdπ calculus of Gardner and Maffeis. An Xdπ-network is a n...
In this work, we extend language-based information-flow security analysis to the case of database ap...
Securing database-backed applications requires tracking information across the application program a...
The root cause for confidentiality and integrity attacks against computing systems is insecure infor...
This paper explores information flow control in systems in which the security classes of data can v...
We explore the logical underpinnings of higher-order, security-typed languages with mutable state. O...
This paper explores information flow control in systems in which the security classes of data can va...
Data-intensive applications as popularised by cloud computing raise many security challenges, due to...
Information systems are widespread and used by anyone with computing devices as well as corporation...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
AbstractA classic problem in security is that of checking that a program has secure information flow...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
AbstractWe describe a type system for the Xdπ calculus of Gardner and Maffeis. An Xdπ-network is a n...
In this work, we extend language-based information-flow security analysis to the case of database ap...
Securing database-backed applications requires tracking information across the application program a...
The root cause for confidentiality and integrity attacks against computing systems is insecure infor...
This paper explores information flow control in systems in which the security classes of data can v...
We explore the logical underpinnings of higher-order, security-typed languages with mutable state. O...
This paper explores information flow control in systems in which the security classes of data can va...