Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...