Sciweavers

187 search results - page 19 / 38
» Secure information flow and program logics
Sort
View
CADE
2005
Springer
15 years 9 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 9 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
64
Voted
CSFW
2010
IEEE
15 years 1 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
POPL
2006
ACM
15 years 9 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam
ESOP
2007
Springer
15 years 1 months ago
Controlling the What and Where of Declassification in Language-Based Security
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...
Heiko Mantel, Alexander Reinhard