Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...