Sciweavers

58 search results - page 2 / 12
» Secure Information Flow via Linear Continuations
Sort
View
ACSC
2006
IEEE
13 years 8 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb
CSFW
2005
IEEE
13 years 10 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
CSFW
2006
IEEE
13 years 11 months ago
Information-Flow Security for Interactive Programs
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
Kevin R. O'Neill, Michael R. Clarkson, Stephen Cho...
IANDC
2007
94views more  IANDC 2007»
13 years 4 months ago
Mediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Guo-Qiang Zhang
SAS
2005
Springer
13 years 10 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken