Security is rarely a static notion. What is considered to be confidential or untrusted data varies over time according to changing events and states. The static verification of secure information flow has been a popular theme in recent programming language research, but information flow policies considered are based on multilevel security which presents a static view of security levels. In this paper we introduce a very simple mechanism for specifying dynamic information flow policies, flow locks, which specify conditions under which data may be read by a certain actor. The interface between the policy and the code is via instructions which open and close flow locks. We present a type and effect system for an ML-like language with reference...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow policies that evolve over time (including, for example, declassification) are widel...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper explores information flow control in systems in which the security classes of data can va...
This paper explores information flow control in systems in which the security classes of data can v...
This thesis investigates the specification and the application of dynamic security policies in infor...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow policies that evolve over time (including, for example, declassification) are widel...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This paper seeks to answer fundamental questionsabout trade-offs between static and dynamic security...