Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide support for expressing and enforcing expressive decentralized policies. This paper focuses on declassification policies, i.e., policies for intended information release.We propose a decentralized language-independent framework for expressing what information can be released. The framework enables combination of data owned by different principals without compromising their respective security policies. A key feature is that information release is permitted only when the owners of the data agree on releasing it. We instantiate the framework for a simple imperative language to show ...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Security assurance is an important challenge for modern computing. Intentional information release (...
Much work on security-typed languages lacks a satisfactory account ofintentional information release...
Abstract. Much work on security-typed languages lacks a satisfactory account of intentional informat...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Much work on security-typed languages lacks a satisfactory account of intentional information releas...
Information-flow security policies are an appealing way of specifying confidentiality and integrity ...
Security assurance is an important challenge for modern computing. Intentional information release (...
Information declassification aims for trusted release of secret information to public environment. E...
Information security has a challenge to address: enabling information-flow controls with expressive ...
This thesis explores defining security policies in a decentralized setting and dynamic methods of en...
This thesis explores defining security policies in a decentralized setting and dynamic methods of en...
This paper studies the problem of securing information release in dynamic languages. We propose (i) ...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Security assurance is an important challenge for modern computing. Intentional information release (...
Much work on security-typed languages lacks a satisfactory account ofintentional information release...
Abstract. Much work on security-typed languages lacks a satisfactory account of intentional informat...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Much work on security-typed languages lacks a satisfactory account of intentional information releas...
Information-flow security policies are an appealing way of specifying confidentiality and integrity ...
Security assurance is an important challenge for modern computing. Intentional information release (...
Information declassification aims for trusted release of secret information to public environment. E...
Information security has a challenge to address: enabling information-flow controls with expressive ...
This thesis explores defining security policies in a decentralized setting and dynamic methods of en...
This thesis explores defining security policies in a decentralized setting and dynamic methods of en...
This paper studies the problem of securing information release in dynamic languages. We propose (i) ...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
Computing systems often deliberately release (or declassify) sensitive information. A principal secu...
We address the issue of declassification in a language-based security approach. We introduce, in a C...