Standard programming models do not provide direct ways of managing secret or untrusted data. This is a problem because programmers must use ad hoc methods to ensure that secrets are not leaked and, conversely, that tainted data is not used to make critical decisions. This dissertation advocates integrating cryptography and language-based analyses in order to build programming environments for declarative information security, in which high-level specifications of confidentiality and integrity constraints are automatically enforced in hostile execution environments. This dissertation describes Aura, a family of programing languages which integrate functional programming, access control via authorization logic, automatic audit logging, and ...
Authorization logics provide a principled and flexible approach to specifying access control policie...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Authorization logics provide a principled and flexible approach to specifying access control policie...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This i...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
Standard programming models do not provide direct ways of managing secret or untrusted data. This is...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
Two of the main ways to protect security-sensitive resources in computer systems are to enforce acce...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
This paper presents AURA, a programming language for access control that treats ordinary programming...
Authorization logics provide a principled and flexible approach to specifying access control policie...
textAs computer systems support more aspects of modern life, from finance to health care, security i...
textAs computer systems support more aspects of modern life, from finance to health care, security i...