Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[BOOK][B] The pi-calculus: a Theory of Mobile Processes

D Sangiorgi, D Walker - 2003 - books.google.com
Mobile systems, whose components communicate and change their structure, now pervade
the informational world and the wider world of which it is a part. The science of mobile …

[BOOK][B] Programming languages for information security

SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …

Analyzing security protocols with secrecy types and logic programs

M Abadi, B Blanchet - Journal of the ACM (JACM), 2005 - dl.acm.org
We study and further develop two language-based techniques for analyzing security
protocols. One is based on a typed process calculus; the other, on untyped logic programs …

A generic type system for the pi-calculus

A Igarashi, N Kobayashi - Theoretical Computer Science, 2004 - Elsevier
We propose a general, powerful framework of type systems for the π-calculus, and show that
we can obtain as its instances a variety of type systems guaranteeing non-trivial properties …

Noninterference for concurrent programs and thread systems

G Boudol, I Castellani - Theoretical Computer Science, 2002 - Elsevier
We propose a type system to ensure the property of noninterference in a system of
concurrent programs, described in a standard imperative language enriched with …

Strong Normalisation in the π-Calculus

N Yoshida, M Berger, K Honda - Information and Computation, 2004 - Elsevier
We introduce a typed π-calculus where strong normalisation is ensured by typability. Strong
normalisation is a useful property in many computational contexts, including distributed …

Principles of secure information flow analysis

G Smith - Malware Detection, 2007 - Springer
In today's world of the Internet, the World-Wide Web, and Google, information is more
accessible than ever before. An unfortunate corollary is that it is harder than ever to protect …

Type-based information flow analysis for the π-calculus

N Kobayashi - Acta Informatica, 2005 - Springer
We propose a new type system for information flow analysis for the π-calculus. As
demonstrated by recent studies, information about whether each communication succeeds …

Dependent information flow types

L Lourenço, L Caires - Proceedings of the 42Nd Annual ACM SIGPLAN …, 2015 - dl.acm.org
In this paper, we develop a novel notion of dependent information flow types. Dependent
information flow types fit within the standard framework of dependent type theory, but, unlike …