Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
JFlow: Practical mostly-static information flow control
AC Myers - Proceedings of the 26th ACM SIGPLAN-SIGACT …, 1999 - dl.acm.org
A promising technique for protecting privacy and integrity of sensitive data is to statically
check information flow within programs that manipulate the data. While previous work has …
check information flow within programs that manipulate the data. While previous work has …
A sound type system for secure flow analysis
Ensuring secure information flow within programs in the context of multiple sensitivity levels
has been widely studied. Especially noteworthy is Denning's work in secure flow analysis …
has been widely studied. Especially noteworthy is Denning's work in secure flow analysis …
[PDF][PDF] A decentralized model for information flow control
AC Myers, B Liskov - ACM SIGOPS Operating Systems Review, 1997 - dl.acm.org
This paper presents a new model for controlling information flow in systems with mutual
distrust and decentralized authority. The model allows users to share information with …
distrust and decentralized authority. The model allows users to share information with …
Protecting privacy using the decentralized label model
AC Myers, B Liskov - ACM Transactions on Software Engineering and …, 2000 - dl.acm.org
Stronger protection is needed for the confidentiality and integrity of data, because programs
containing untrusted code are the rule rather than the exception. Information flow control …
containing untrusted code are the rule rather than the exception. Information flow control …
A core calculus of dependency
Notions of program dependency arise in many settings: security, partial evaluation, program
slicing, and call-tracking. We argue that there is a central notion of dependency common to …
slicing, and call-tracking. We argue that there is a central notion of dependency common to …
The SLam calculus: programming with secrecy and integrity
N Heintze, JG Riecke - Proceedings of the 25th ACM SIGPLAN-SIGACT …, 1998 - dl.acm.org
The SLam calculus is a typed λ-calculus that maintains security information as well as type
information. The type system propagates security information for each object in four forms …
information. The type system propagates security information for each object in four forms …
Secure information flow in a multi-threaded imperative language
Previously, we developed a type system to ensure secure information flow in a sequential,
imperative programming language [VSI96]. Program variables are classified as either high …
imperative programming language [VSI96]. Program variables are classified as either high …
Observational determinism for concurrent program security
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …
policies for data confidentiality and integrity. However, extending noninterference to …
A theory of type qualifiers
We describe a framework for adding type qualifiers to a language. Type qualifiers encode a
simple but highly useful form of subty**. Our framework extends standard type rules to …
simple but highly useful form of subty**. Our framework extends standard type rules to …