International audienceIn this paper, we introduce a formal property characterizing access control policies for which the interpretations of access control as mechanism over objects and as mechanism over information contained into objects are similar. This leads us to define both a flow based interpretation of access control policies and the information flows generated during the executions of a system implementing an access control mechanism. When these two interpretations are not equivalent, we propose to add a mechanism dedicated to illegal information flow detection to the mechanism of access control over objects. Such a mechanism is parameterized by the access control policy and is proved sound and complete. Finally, we briefly describe...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality viol...
Abstract—Because information flow control mechanisms often rely on an underlying authorization mecha...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect th...
Enforcing the confidentiality and integrity of information is critical in distributed applications. ...
International audienceThe prevention of information flow is an important concern in several access c...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
In this paper we present a model for defining and enforcing a fine-grained information flow policy. ...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Recent years have seen a proliferation of research on information flow control. While the progress h...
When a computer program requires legitimate access to confidential data, the question arises whether...
International audienceSeveral points of view exist about security policies among which two main appr...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality viol...
Abstract—Because information flow control mechanisms often rely on an underlying authorization mecha...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect th...
Enforcing the confidentiality and integrity of information is critical in distributed applications. ...
International audienceThe prevention of information flow is an important concern in several access c...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
In this paper we present a model for defining and enforcing a fine-grained information flow policy. ...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Recent years have seen a proliferation of research on information flow control. While the progress h...
When a computer program requires legitimate access to confidential data, the question arises whether...
International audienceSeveral points of view exist about security policies among which two main appr...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Sensitive information is a crucial asset for both individuals and companies. Since it is processed i...
This thesis explores several ways to diversify the field of Information Flow Control. At the heart o...