Sciweavers

1183 search results - page 18 / 237
» On flow-sensitive security types
Sort
View
CSFW
2003
IEEE
15 years 9 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
CSFW
2004
IEEE
15 years 8 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 9 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
ESORICS
2012
Springer
13 years 6 months ago
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extend...
Cas J. F. Cremers, Michele Feltz
OOPSLA
1990
Springer
15 years 8 months ago
Type Substitution for Object-Oriented Programming
Genericity allows the substitution of types in a class. This is usually obtained through parameterized classes, although they are inflexible since any class can be inherited but i...
Jens Palsberg, Michael I. Schwartzbach