Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Secure program partitioning

S Zdancewic, L Zheng, N Nystrom… - ACM Transactions on …, 2002 - dl.acm.org
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …

[PDF][PDF] Secure Information Flow and Pointer Confinement in a Java-like Language.

A Banerjee, DA Naumann - CSFW, 2002 - Citeseer
We consider a sequential object-oriented language with pointers and mutable state, private
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …

Stack-based access control and secure information flow

A Banerjee, DA Naumann - Journal of functional programming, 2005 - cambridge.org
Access control mechanisms are often used with the intent of enforcing confidentiality and
integrity policies, but few rigorous connections have been made between information flow …

[LLIBRE][B] Programming languages for information security

SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …

Using replication and partitioning to build secure distributed systems

L Zheng, S Chong, AC Myers… - 2003 Symposium on …, 2003 - ieeexplore.ieee.org
A challenging unsolved security problem is how to specify and enforce system-wide security
policies; this problem is even more acute in distributed systems with mutual distrust. This …

On the composition of secure systems

H Mantel - Proceedings 2002 IEEE Symposium on Security and …, 2002 - ieeexplore.ieee.org
When complex systems are constructed from simpler components it is important to know
how properties of the components behave under composition. We present various …

A survey on formal specification and verification of separation kernels

Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which
provide their hosted applications with spatial and temporal separation as well as controlled …

Untrusted hosts and confidentiality: Secure program partitioning

S Zdancewic, L Zheng, N Nystrom… - ACM SIGOPS Operating …, 2001 - dl.acm.org
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …