Given a partially ordered set (poset) of security levels, and a labelling of inputs and outputs with such levels, non-interference (or secure information flow) is a security property expressing that outputs of level l only depend on inputs that are labelled with a level smaller than l. In other words, there is no information flow from high (confidential) levels, to low (public) levels. For web browsers, as programs that interact intensely with a variety of principals, non-interference is an interesting security property, and several authors have studied how enforcement mechanisms for it can be incorporated in a browser, usually focusing on specific scenarios such as securing the flow of information towards advertisements, or securing mashup...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
We investigate non-interference (secure information flow) policies for web browsers, replacing or co...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
A web browser works with data and scripts from different sources, and these sources are not all trus...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
JavaScript has become a central technology of the web, but it is also the source of many security pr...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
Over the years, computer systems and applications have grown significantly complex while handling a ...
Abstract. Even though their architecture relies on robust security prin-ciples, it is well-known tha...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
Even though their architecture relies on robust security principles, it is well-known that poor prog...
We investigate non-interference (secure information flow) policies for web browsers, replacing or co...
Many programs operate reactively-patiently waiting for user input, running for a while producing out...
A web browser works with data and scripts from different sources, and these sources are not all trus...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Non-interference happens when some elements of a dynamic system do not interfere, i.e., do not a ect...
JavaScript has become a central technology of the web, but it is also the source of many security pr...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
In this paper, we illustrate the role of the notion of Abstract Non-Interference in language based s...
Over the years, computer systems and applications have grown significantly complex while handling a ...
Abstract. Even though their architecture relies on robust security prin-ciples, it is well-known tha...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
In this paper we generalize the notion of non-interference making it parametric relatively to what a...
In this paper we provide a survey on the framework of abstract non-interference. In particular, we d...
Even though their architecture relies on robust security principles, it is well-known that poor prog...