The move toward publically available services that store private information has increased the importance of tracking information flow in applications. For example, network systems that store credit-card transactions and medical records must be assured to maintain the confidentiality and integrity of this information. One way to ensure this is to use a language that supports static reasoning about information flow in the type system. While useful in practice, current type systems for checking information flow are imprecise, unnecessarily rejecting safe programs. This annoys programmers and often results in increased code complexity in order to work around these artificial limitations. In this work, we present a new type system for staticall...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
This paper explores information flow control in systems in which the security classes of data can va...
Program errors are a source of information leaks. Track-ing these leaks is hard because error propag...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
This thesis investigates the specification and the application of dynamic security policies in infor...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
If we classify variables in a program into various security levels, then a secure information flow a...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
This paper presents a language in which information flow is securely controlled by a type system, ye...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal...
This paper presents a language in which information flow is securely controlled by a type system, ye...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
This paper explores information flow control in systems in which the security classes of data can va...
Program errors are a source of information leaks. Track-ing these leaks is hard because error propag...
The article of record as published may be located at http://dx.doi.org/10.1016/S0167-4048(97)00002...
This thesis investigates the specification and the application of dynamic security policies in infor...
AbstractType systems and program logics are often thought to be at opposing ends of the spectrum of ...
International audienceNon-interference guarantees the absence of illicit information flow throughout...
If we classify variables in a program into various security levels, then a secure information flow a...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
This paper presents a language in which information flow is securely controlled by a type system, ye...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal...
This paper presents a language in which information flow is securely controlled by a type system, ye...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Type systems and program logics are often thought to be at opposing ends of the spectrum of formal s...
This paper explores information flow control in systems in which the security classes of data can va...
Program errors are a source of information leaks. Track-ing these leaks is hard because error propag...