We demonstrate that a practical concurrent language can be extended in a natural way with information security mechanisms that provably enforce strong information security guarantees. We extend the X10 concurrent programming language with coarse-grained information-flow control. Central to X10 concurrency abstractions is the notion of a place: a container for data and computation. We associate a security level with each place, and restrict each place to store only data appropriate for that security level. When places interact only with other places at the same security level, then our security mechanisms impose no restrictions. When places of differing security levels interact, our information security analysis prevents potentially dangerou...
Cryptography today has evolved far beyond its traditional goal of secure message transmission. Throu...
Achieving security under concurrent composition is notoriously hard. Indeed, in the plain model, far...
Multilevel security deals with the problem of controlling the flow of classified information. We pre...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
We present a general unwinding framework for the definition of information flow security properties ...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Proving only over source code that programs do not leak sensitive data leaves a gap between reasonin...
Cryptography today has evolved far beyond its traditional goal of secure message transmission. Throu...
Achieving security under concurrent composition is notoriously hard. Indeed, in the plain model, far...
Multilevel security deals with the problem of controlling the flow of classified information. We pre...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
International audienceInformation flow type systems provide an elegant means to enforce confidential...
It is common to prove by reasoning over source code that programs do not leak sensitive data. But do...
Noninterference is a property of sequential programs that is useful for expressing security policies...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
We present a general unwinding framework for the definition of information flow security properties ...
http://portal.acm.org/Information flow type systems provide an elegant means to enforce confidential...
Controlling confidential information in concurrent systems is difficult, due to covert channels resu...
Methods for proving that concurrent software does not leak its secrets has remained an active topic ...
Proving only over source code that programs do not leak sensitive data leaves a gap between reasonin...
Cryptography today has evolved far beyond its traditional goal of secure message transmission. Throu...
Achieving security under concurrent composition is notoriously hard. Indeed, in the plain model, far...
Multilevel security deals with the problem of controlling the flow of classified information. We pre...