International audienceInformation-flow security typing statically preservesconfidentiality by enforcing noninterference. To address the practical need of selective and flexible declassification of confidentialinformation, several approaches have developed a notion of relaxed non interference, where security labels are either functionsor types. The labels-as-types approach to relaxed non interference supports expressive declassification policies, including recursiveones, via a simple subtyping-based ordering, and provides alocal, modular reasoning principle. In this work, we extend this expressive declassification approach in order to support polymorphic declassification. First, we identify the need for bound...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
The -calculus is a process calculus in which we can compositionally represent dynamics of major prog...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation-flow security typing statically preservesconfidentiality by enforc...
International audienceInformation-flow security typing statically prevents confidential information ...
Information-flow security typing statically prevents confidential information to leak to public cha...
AbstractLanguage-based approaches to information security have led to the development of security ty...
Language-based approaches to information security have led to the development of security type syste...
Language-based approaches to information security have led to the development of security type syste...
Security-typed languages are powerful tools for provably enforcing noninterference. Real computing s...
This paper presents a calculus that supports information-flow security policies and certificate-base...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Cryptography is information hiding. Polymorphism is also information hiding. So is cryptography pol...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
The -calculus is a process calculus in which we can compositionally represent dynamics of major prog...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...
International audienceInformation-flow security typing statically preservesconfidentiality by enforc...
International audienceInformation-flow security typing statically prevents confidential information ...
Information-flow security typing statically prevents confidential information to leak to public cha...
AbstractLanguage-based approaches to information security have led to the development of security ty...
Language-based approaches to information security have led to the development of security type syste...
Language-based approaches to information security have led to the development of security type syste...
Security-typed languages are powerful tools for provably enforcing noninterference. Real computing s...
This paper presents a calculus that supports information-flow security policies and certificate-base...
Cryptographic operations are essential for many security-critical systems. Reasoning about informati...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Cryptography is information hiding. Polymorphism is also information hiding. So is cryptography pol...
Starting from the seminal work of Volpano and Smith, there has been growing evidence that type syste...
Noninterference is the basic semantical condition used to account for confidentiality and integrity-...
The -calculus is a process calculus in which we can compositionally represent dynamics of major prog...
While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end conf...