Language-based information flow control (IFC) aims to provide guarantees about information propagation in computer systems having multiple security levels. Existing IFC systems extend the lattice model of Denning's, enforcing transitive security policies by tracking information flows along with a partially ordered set of security levels. They yield a transitive noninterference property of either confidentiality or integrity. In this paper, we explore IFC for security policies that are not necessarily transitive. Such nontransitive security policies avoid unwanted or unexpected information flows implied by transitive policies and naturally accommodate high-level coarse-grained security requirements in modern component-based software. We pres...
We show that fine-grained and coarse-grained dynamic information-flow control (IFC) systems are equa...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
Abstract—This paper addresses the question of how TA-security, a semantics for intransitive informat...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This paper explores information flow control in systems in which the security classes of data can v...
This paper explores information flow control in systems in which the security classes of data can va...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Nontransitive Noninterference (NTNI) and Nontransitive Types (NTT) are a new security condition and ...
We show that fine-grained and coarse-grained dynamic information-flow control (IFC) systems are equa...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
Abstract—This paper addresses the question of how TA-security, a semantics for intransitive informat...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly i...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
This paper explores information flow control in systems in which the security classes of data can v...
This paper explores information flow control in systems in which the security classes of data can va...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Nontransitive Noninterference (NTNI) and Nontransitive Types (NTT) are a new security condition and ...
We show that fine-grained and coarse-grained dynamic information-flow control (IFC) systems are equa...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...