Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

JFlow: Practical mostly-static information flow control

AC Myers - Proceedings of the 26th ACM SIGPLAN-SIGACT …, 1999 - dl.acm.org
A promising technique for protecting privacy and integrity of sensitive data is to statically
check information flow within programs that manipulate the data. While previous work has …

A sound type system for secure flow analysis

D Volpano, C Irvine, G Smith - Journal of computer security, 1996 - content.iospress.com
Ensuring secure information flow within programs in the context of multiple sensitivity levels
has been widely studied. Especially noteworthy is Denning's work in secure flow analysis …

[PDF][PDF] A decentralized model for information flow control

AC Myers, B Liskov - ACM SIGOPS Operating Systems Review, 1997 - dl.acm.org
This paper presents a new model for controlling information flow in systems with mutual
distrust and decentralized authority. The model allows users to share information with …

Protecting privacy using the decentralized label model

AC Myers, B Liskov - ACM Transactions on Software Engineering and …, 2000 - dl.acm.org
Stronger protection is needed for the confidentiality and integrity of data, because programs
containing untrusted code are the rule rather than the exception. Information flow control …

A core calculus of dependency

M Abadi, A Banerjee, N Heintze… - Proceedings of the 26th …, 1999 - dl.acm.org
Notions of program dependency arise in many settings: security, partial evaluation, program
slicing, and call-tracking. We argue that there is a central notion of dependency common to …

The SLam calculus: programming with secrecy and integrity

N Heintze, JG Riecke - Proceedings of the 25th ACM SIGPLAN-SIGACT …, 1998 - dl.acm.org
The SLam calculus is a typed λ-calculus that maintains security information as well as type
information. The type system propagates security information for each object in four forms …

Secure information flow in a multi-threaded imperative language

G Smith, D Volpano - Proceedings of the 25th ACM SIGPLAN-SIGACT …, 1998 - dl.acm.org
Previously, we developed a type system to ensure secure information flow in a sequential,
imperative programming language [VSI96]. Program variables are classified as either high …

Observational determinism for concurrent program security

S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …

A theory of type qualifiers

JS Foster, M Fähndrich, A Aiken - ACM Sigplan Notices, 1999 - dl.acm.org
We describe a framework for adding type qualifiers to a language. Type qualifiers encode a
simple but highly useful form of subty**. Our framework extends standard type rules to …