Security policies are naturally dynamic. Reflecting this, there has been a growing interest in studying information-flow properties which change during program execution, including concepts such as declassification, revocation, and role-change. A static verification of a dynamic information flow policy, from a semantic perspective, should only need to concern itself with two things: 1) the dependencies between data in a program, and 2) whether those dependencies are consistent with the intended flow policies as they change over time. In this paper we provide a formal ground for this intuition. We present a straightforward extension to the principal flow-sensitive type system introduced by Hunt and Sands (POPL’06, ESOP’11) to infer both end-...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper introduces the use of static information flow analysis for the specification and enforcem...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Security policies are naturally dynamic. Reflecting this, there has been a growing interest in study...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow control and dynamic policies is a difficult relationship yet to be fully understood...
Information flow policies are often dynamic; the security concerns of a program will typically chang...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Information-flow control enforces security policies on the information handled by computer applicati...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper introduces the use of static information flow analysis for the specification and enforce...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper introduces the use of static information flow analysis for the specification and enforcem...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...
Security policies are naturally dynamic. Reflecting this, there has been a growing interest in study...
This thesis investigates the specification and the application of dynamic security policies in infor...
Information flow control and dynamic policies is a difficult relationship yet to be fully understood...
Information flow policies are often dynamic; the security concerns of a program will typically chang...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Information-flow control enforces security policies on the information handled by computer applicati...
Dynamic updating of information-flow policies Applications that manipulate sensitive information sho...
Security is rarely a static notion. What is considered to be confidential or untrusted data varies o...
Applications that manipulate sensitive information should ensure end-to-end security by satisfying t...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper introduces the use of static information flow analysis for the specification and enforce...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper presents a language in which information flow is securely controlled by a type system, ye...
This paper introduces the use of static information flow analysis for the specification and enforcem...
In this paper, we develop a novel notion of dependent information flow types. Dependent information ...