This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a simple programming language via modification of security levels of variables. Our approach is sound and compositional and results in an algorithm for statically checking confidentiality
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis investigates the specification and the application of dynamic security policies in infor...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
Contains fulltext : 33010.pdf (publisher's version ) (Closed access)WITS '05 Works...
With the ever increase in the demand of building secure systems, recent years are witnessing a pleth...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis investigates the specification and the application of dynamic security policies in infor...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
This paper presents a new approach for verifying confidentiality for programs, based on abstract int...
Confidentiality is maybe the most popular security property to be formally or informally verified. N...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
Contains fulltext : 33010.pdf (publisher's version ) (Closed access)WITS '05 Works...
With the ever increase in the demand of building secure systems, recent years are witnessing a pleth...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis investigates the specification and the application of dynamic security policies in infor...
Non-interference is typically used as a baseline security policy to formalize confidentiality of sec...