Two of the main ways to protect security-sensitive resources in computer systems are to enforce access-control policies and information-flow policies. In this paper, we show how to enforce information-flow policies in AURA, which is a programming language for access control. When augmented with this mechanism for enforcing information-flow polices, AURA can further improve the security of reference monitors that implement access control. We show how to encode security types and lattices of security labels using AURA’s existing constructs for authorization logic. We prove a noninterference theorem for this encoding. We also investigate how to use expressive access control policies specified in authorization logic as the policies for informat...
Enforcing the confidentiality and integrity of information is critical in distributed applications. ...
Increasing the expressiveness of information flow labels can improve the permissiveness of an enforc...
Enforcing the confidentiality and integrity of information is critical in distributed applications....
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Enforcing the confidentiality and integrity of information is critical in distributed applications. ...
Increasing the expressiveness of information flow labels can improve the permissiveness of an enforc...
Enforcing the confidentiality and integrity of information is critical in distributed applications....
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Enforcing the confidentiality and integrity of information is critical in distributed applications. ...
Increasing the expressiveness of information flow labels can improve the permissiveness of an enforc...
Enforcing the confidentiality and integrity of information is critical in distributed applications....