This paper presents a new, axiomatic approach to information flow in sequential and parallel programs. Flow axioms that capture the information flow semantics of a variety of statements are given and used to construct program flow proofs. The method is illustrated by a variety of examples. The applications of flow proofs to certifying information flow policies and solving the confinement problem are considered. It is also shown that flow axioms and correctness axioms can be combined to form an even more powerful proof system. Keywords and Phrases: information flow, information security, security certification, parallel programs, axiomatic logic, proof rules
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information,...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
We give a formal definition of the notion of information flow for a simple guarded command language....
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Abstract. We present a general unwinding framework for the definition of information flow security p...
This paper proposes an extensional semantics-based formal specification of secure information-flow ...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
In this thesis, we elaborate a uniform basis for the systematic investigation of possibilistic infor...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
This thesis presents an axiomatic method for proving certain correctness properties of parallel pro...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information,...
Information flow control mechanisms detect and prevent transfers of information which violate the se...
We give a formal definition of the notion of information flow for a simple guarded command language....
We present an approach to formally prove secure information flow in multi-threaded programs. We star...
This paper presents a technique for verifying secure information flow in concurrent programs consist...
Abstract. We present a general unwinding framework for the definition of information flow security p...
This paper proposes an extensional semantics-based formal specification of secure information-flow ...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
In this thesis, we elaborate a uniform basis for the systematic investigation of possibilistic infor...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
This thesis presents an axiomatic method for proving certain correctness properties of parallel pro...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using...
Dynamic information flow policies, such as declassification, are essential for practically useful in...
Abstract Information-flow analysis can prevent programs from improperlyrevealing secret information,...
Information flow control mechanisms detect and prevent transfers of information which violate the se...