This paper introduces a run-time mechanism for preventing leakage of secure information in distributed systems. We consider a general concurrency language model where concurrent objects interact by asynchronous method calls and futures. The aim is to prevent leakage of secure information to low-level viewers. The approach is based on a notion of security wrappers, where a wrapper encloses an object or a component and controls its interactions with the environment. Our run-time system automatically adds a wrapper to an insecure component.The wrappers are invisible such that a wrapped component and its environment are not aware of it. The security policies of a wrapper are formalized based on a notion of security levels. At run-time, future c...
The problem of controlling information flow in multithreaded programs remains an important open chal...
With the ever increase in the demand of building secure systems, recent years are witnessing a pleth...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
In this paper we describe a language based security model for distributed computing based on functio...
In this paper we describe a language based security model for distributed computing based on functio...
this paper is on the manner in which information flow policies can be enforced in an object-oriented...
In modern systems it is often necessary to distinguish between confidential (low-level) and non-conf...
Abstract—In this paper, we provide a formal framework for the security of distributed active objects...
AbstractWe present in this article a precise security model for data confidentiality in the framewor...
In this paper, we provide a formal framework for the security of distributed active objects. Active ...
Abstract. Securing communication in large scale distributed systems is an open problem. When multipl...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper explores information flow control in systems in which the security classes of data can v...
The problem of controlling information flow in multithreaded programs remains an important open chal...
With the ever increase in the demand of building secure systems, recent years are witnessing a pleth...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
In this paper we describe a language based security model for distributed computing based on functio...
In this paper we describe a language based security model for distributed computing based on functio...
this paper is on the manner in which information flow policies can be enforced in an object-oriented...
In modern systems it is often necessary to distinguish between confidential (low-level) and non-conf...
Abstract—In this paper, we provide a formal framework for the security of distributed active objects...
AbstractWe present in this article a precise security model for data confidentiality in the framewor...
In this paper, we provide a formal framework for the security of distributed active objects. Active ...
Abstract. Securing communication in large scale distributed systems is an open problem. When multipl...
Securing communication in large scale distributed systems is an open problem. When multiple principa...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
This paper explores information flow control in systems in which the security classes of data can v...
The problem of controlling information flow in multithreaded programs remains an important open chal...
With the ever increase in the demand of building secure systems, recent years are witnessing a pleth...
Information flow control mechanisms detect and prevent transfers of information which violate the se...