Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
In collaborative applications, participants agree on certain level of secure communication based on communication policy speciļ¬cations. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
This paper introduces the use of static information ļ¬ow analysis for the speciļ¬cation and enforcement of end-toend availability policies in programs. We generalize the decentr...
āThis paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querierās ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...