Information flow policies that evolve over time (including, for example, declassification) are widely recognised as an essential ingredient in useable information flow control system. In previous work ([BS06a, BS06b]) we have shown one approach to such policies, flow locks, which is a very general and flexible system capable of encoding many other proposed approaches. However, any such policy approach is only useful if we have a precise specification - a semantic model - of what we are trying to enforce. A semantic model gives us insight into what a policy actually guarantees, and defines the precise goals of any enforcement mechanism. Unfortunately, semantic models of declassification can be both inaccurate and difficult to understand. Thi...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Information flow techniques typically classify information according to suitable security levels and...
An emerging problem in systems security is controlling how a program uses the data it has access to....
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Information systems manage different types of data, commonly classified between public and secret da...
Information systems manage different types of data, commonly classified between public and secret da...
Recent years have seen a proliferation of research on information flow control. While the progress h...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Information flow techniques typically classify information according to suitable security levels and...
An emerging problem in systems security is controlling how a program uses the data it has access to....
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
We address the issue of declassification in a language-based security approach. We introduce, in a C...
Information systems manage different types of data, commonly classified between public and secret da...
Information systems manage different types of data, commonly classified between public and secret da...
Recent years have seen a proliferation of research on information flow control. While the progress h...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
International audienceStandard multilevel security (MLS) policies lack flexibility as data classific...
AbstractA classic problem in security is that of checking that a program has secure information flow...
Information flow techniques typically classify information according to suitable security levels and...
An emerging problem in systems security is controlling how a program uses the data it has access to....