Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[BOOK][B] Individual freedom in language teaching

C Brumfit - 2013 - books.google.com
The book draws upon linguistic, psychological, philosophical, and sociolinguistic principles
and uses practical examples from second, foreign, and mother tongue teaching. It attempts …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …

Fine-grained information flow analysis and enforcement in a java virtual machine

D Chandra, M Franz - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
We have implemented an information flow framework for the Java virtual machine that
combines static and dynamic techniques to capture not only explicit flows, but also implicit …

Automatic validation of protocol narration

C Bodei, M Buchholtz, P Degano… - 16th IEEE Computer …, 2003 - ieeexplore.ieee.org
We perform a systematic expansion of protocol narrations into terms of process algebra in
order to make precise some of the detailed checks that need to be made in a protocol. We …

Flow Logic: a multi-paradigmatic approach to static analysis

HR Nielson, F Nielson - The Essence of Computation: Complexity …, 2002 - Springer
Flow logic is an approach to static analysis that separates the specification of when an
analysis estimate is acceptable for a program from the actual computation of the analysis …

Abstracting IoT protocols using timed process algebra and SPIN model checker

N Suresh Kumar, G Santhosh Kumar - Cluster Computing, 2023 - Springer
The advancement of the Internet of Things (IoT) has tremendously influenced many fields of
human life. The Internet of Medical Things, Internet of Flying Things, Internet of Floating …

Tracing where IoT data are collected and aggregated

C Bodei, P Degano, GL Ferrari… - Logical Methods in …, 2017 - lmcs.episciences.org
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart
objects that automatically collect and exchange data of various kinds, directly gathered from …

Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

M Backes, C Hriţcu, M Maffei - Journal of Computer Security, 2014 - content.iospress.com
We present a new type system for verifying the security of reference implementations of
cryptographic protocols written in a core functional programming language. The type system …

Analysis of security protocols as open systems

F Martinelli - Theoretical Computer Science, 2003 - Elsevier
We propose a methodology for the formal analysis of security protocols. This originates from
the observation that the verification of security protocols can be conveniently treated as the …