Sciweavers

315 search results - page 9 / 63
» Arrows for secure information flow
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
CSFW
2005
IEEE
14 years 1 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
CCS
2006
ACM
13 years 11 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
CSFW
2004
IEEE
13 years 11 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi