AbstractWe consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow property based on the idea of invariance under perturbation, relating observable changes in output to corresponding changes in input. Besides the information flow condition itself, the main contributions of the paper are results relating the admissibility property to a direct flow property in the special case of programs which branch on secrets only ...
This thesis investigates the specification and the application of dynamic security policies in infor...
In various scenarios, there is a need to expose a certain API to client programs which are not fully...
Abstract. Protecting data is not simply a case of encrypt and forget: even data with full cryptograp...
AbstractWe consider the problem of implementing a security protocol in such a manner that secrecy of...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We provide a novel definition of quantitative information flow, called transmissible information, th...
Information Flow Control is a well established field of research, providing asuite of theoretical an...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
This thesis investigates the specification and the application of dynamic security policies in infor...
In various scenarios, there is a need to expose a certain API to client programs which are not fully...
Abstract. Protecting data is not simply a case of encrypt and forget: even data with full cryptograp...
AbstractWe consider the problem of implementing a security protocol in such a manner that secrecy of...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
We provide a novel definition of quantitative information flow, called transmissible information, th...
Information Flow Control is a well established field of research, providing asuite of theoretical an...
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showi...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
This thesis investigates the specification and the application of dynamic security policies in infor...
In various scenarios, there is a need to expose a certain API to client programs which are not fully...
Abstract. Protecting data is not simply a case of encrypt and forget: even data with full cryptograp...