A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Tight enforcement of information-release policies for dynamic languages

A Askarov, A Sabelfeld - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
This paper studies the problem of securing information release in dynamic languages. We
propose (i) an intuitive framework for information-release policies expressing both what can …

Expressive declassification policies and modular static enforcement

A Banerjee, DA Naumann… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
This paper provides a way to specify expressive declassification policies, in particular, when,
what, and where policies that include conditions under which downgrading is allowed …

A library for light-weight information-flow security in Haskell

A Russo, K Claessen, J Hughes - ACM Sigplan Notices, 2008 - dl.acm.org
Protecting confidentiality of data has become increasingly important for computing systems.
Information-flow techniques have been developed over the years to achieve that purpose …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

Verifiable Security Policies for Distributed Systems

FA Wolf, P Müller - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
In the context of secure information flow, security policies express the classification and
declassification of data. Existing policy frameworks are tightly linked to a programming …

Abstract non-interference: a unifying framework for weakening information-flow

R Giacobazzi, I Mastroeni - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Non-interference happens when some elements of a dynamic system do not interfere, ie, do
not affect, other elements in the same system. Originally introduced in language-based …

Stateful declassification policies for event-driven programs

M Vanhoef, W De Groef, D Devriese… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
We propose a novel mechanism for enforcing information flow policies with support for
declassification on event-driven programs. Declassification policies consist of two functions …

A domain-specific programming language for secure multiparty computation

JD Nielsen, MI Schwartzbach - Proceedings of the 2007 workshop on …, 2007 - dl.acm.org
We present a domain-specific programming language for Secure Multiparty Computation
(SMC). Information is a resource of vital importance and considerable economic value to …

A lattice-based approach to mashup security

J Magazinius, A Askarov, A Sabelfeld - … of the 5th ACM symposium on …, 2010 - dl.acm.org
A web mashup is a web application that integrates content from different providers to create
a new service, not offered by the content providers. As mashups grow in popularity, the …