Standard programming models do not provide direct ways of managing secret or untrusted data. This is a problem because programmers must use ad hoc methods to ensure that secrets are not leaked and, conversely, that tainted data is not used to make critical decisions. This dissertation advocates integrating cryptography and language-based analyses in order to build programming environments for declarative information security, in which high-level specifications of confidentiality and integrity constraints are automatically enforced in hostile execution environments. This dissertation describes Aura, a family of programing languages which integrate functional programming, access control via authorization logic, automatic audit logging, and co...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmer...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Authorization logics provide a principled and flexible approach to specifying access control policie...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmer...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Authorization logics provide a principled and flexible approach to specifying access control policie...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmer...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...