Confidentiality and integrity are often treated as dual properties in formal models of information-flow control, access control and many other areas in computer security. However, in contrast to confidentiality policies, integrity policies are less formally studied in the information-flow control literature. One important reason is that traditional noninterference-based information-flow control approaches give very weak integrity guarantees for untrusted code. Integrity and confidentiality policies are also different with respect to implicit information channels. This paper studies integrity downgrading policies in information-flow control and compares them with their confidentiality counterparts. We examine the drawbacks of integrity polic...
Recent years have seen a proliferation of research on information flow control. While the progress h...
Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiali...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Confidentiality and integrity are often treated as dual properties in formal models of information-f...
In traditional information-flow type systems, the security policy is often formalized as noninterfer...
Abstract. Information integrity policies are traditionally enforced by access control mechanisms tha...
Two information-flow integrity measures are introduced: contamination and suppression. The former ...
This paper presents a practical application of language-based information-flow control, namely, a do...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
Noninterference requires that there is no information flow from sensitive to public data in a given ...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Abstract: Two kinds of integrity measures—contamination and suppression—are introduced. Contaminatio...
AbstractAn integrity policy defines the situations when modification of information is authorised an...
Information flow security properties such as noninterference ensure the protection of confidential d...
Recent years have seen a proliferation of research on information flow control. While the progress h...
Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiali...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Confidentiality and integrity are often treated as dual properties in formal models of information-f...
In traditional information-flow type systems, the security policy is often formalized as noninterfer...
Abstract. Information integrity policies are traditionally enforced by access control mechanisms tha...
Two information-flow integrity measures are introduced: contamination and suppression. The former ...
This paper presents a practical application of language-based information-flow control, namely, a do...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
Noninterference requires that there is no information flow from sensitive to public data in a given ...
Language-based information flow methods offer a principled way to enforcestrong security properties,...
Abstract: Two kinds of integrity measures—contamination and suppression—are introduced. Contaminatio...
AbstractAn integrity policy defines the situations when modification of information is authorised an...
Information flow security properties such as noninterference ensure the protection of confidential d...
Recent years have seen a proliferation of research on information flow control. While the progress h...
Information-flow type systems are a promising approach for enforcing strong end-to-end confidentiali...
We address the issue of declassification in a language-based security approach. We introduce, in a C...