Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities today do not arise from deficiencies in network security or encryption mechanisms, but from software that fails to provide adequate protection for the information it handles. Programs are not prevented from revealing too much of their information to actors who can legitimately interact with them, and restricting access to the data is not a viable solution. What is needed is mechanisms that can control not only what information a program has access to, but also how the program handles that information once access is given. This thesis describes Paralocks, a language for building expressive but statically verifiable fine-grained information flo...
Information flow control and dynamic policies is a difficult relationship yet to be fully understood...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities ...
The work presented in this thesis contributes to the information flowpolicy specification language P...
Conventional security policies for software applications are adequate for managing concerns on the l...
Conventional security policies for software applications are adequate for managing concerns on the l...
We demonstrate Paragon, a Java-based programming language with integrated information-flow control. ...
This paper presents Paralocks, a language for building expressive but statically verifiable fine-gra...
This paper presents Paralocks, a language for building expressive but statically verifiable fine-gra...
Broberg and Sands (POPL’10) introduced a logic-based policy language, Paralocks, suitable for static...
Information-flow control enforces security policies on the information handled by computer applicati...
Early work on information flow security sought to develop theories for proving the absence of unwant...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow control and dynamic policies is a difficult relationship yet to be fully understood...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities ...
The work presented in this thesis contributes to the information flowpolicy specification language P...
Conventional security policies for software applications are adequate for managing concerns on the l...
Conventional security policies for software applications are adequate for managing concerns on the l...
We demonstrate Paragon, a Java-based programming language with integrated information-flow control. ...
This paper presents Paralocks, a language for building expressive but statically verifiable fine-gra...
This paper presents Paralocks, a language for building expressive but statically verifiable fine-gra...
Broberg and Sands (POPL’10) introduced a logic-based policy language, Paralocks, suitable for static...
Information-flow control enforces security policies on the information handled by computer applicati...
Early work on information flow security sought to develop theories for proving the absence of unwant...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow control and dynamic policies is a difficult relationship yet to be fully understood...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...