This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification, without modifying the base language. This design avoids the redundant work of producing new languages, lowers the threshold for adopting security-typed languages, and also provides great flexibility and modularity for using security-policy frameworks. The embedded security sublanguage is designed using a standard combinator interface called arrows. Computations constructed in the sublanguage have static and explicit control-flow components, making it poss...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This paper presents an embedded security sublanguage for enforcing information-flow policies in the ...
AbstractThis paper presents an embedded security sublanguage for enforcing information-flow policies...
This paper presents an embedded security sublanguage for enforcing information-flow policies in the ...
This paper presents an embedded security sublanguage for enforcing information- flow policies in the...
Protecting confidentiality of data has become increasingly important for computing systems. Informat...
We describe a new, dynamic, floating-label approach to language-based information flow control, and ...
The programming language Haskell plays a unique, privileged role in information-flow control (IFC) r...
Protecting data confidentiality and integrity has become increasingly important in modern software. ...
Distributed applications typically involve many components, each with unique security and privacy re...
This thesis consists of two separate parts. Both concernprogramming language design, the first in th...
This paper presents a language in which information flow is securely controlled by a type system, ye...
The programming language Haskell plays a unique, privileged role in Information-Flow Control (IFC) r...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This paper presents an embedded security sublanguage for enforcing information-flow policies in the ...
AbstractThis paper presents an embedded security sublanguage for enforcing information-flow policies...
This paper presents an embedded security sublanguage for enforcing information-flow policies in the ...
This paper presents an embedded security sublanguage for enforcing information- flow policies in the...
Protecting confidentiality of data has become increasingly important for computing systems. Informat...
We describe a new, dynamic, floating-label approach to language-based information flow control, and ...
The programming language Haskell plays a unique, privileged role in information-flow control (IFC) r...
Protecting data confidentiality and integrity has become increasingly important in modern software. ...
Distributed applications typically involve many components, each with unique security and privacy re...
This thesis consists of two separate parts. Both concernprogramming language design, the first in th...
This paper presents a language in which information flow is securely controlled by a type system, ye...
The programming language Haskell plays a unique, privileged role in Information-Flow Control (IFC) r...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...