Observational determinism for concurrent program security
S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …
policies for data confidentiality and integrity. However, extending noninterference to …
Stack-based access control and secure information flow
A Banerjee, DA Naumann - Journal of functional programming, 2005 - cambridge.org
Access control mechanisms are often used with the intent of enforcing confidentiality and
integrity policies, but few rigorous connections have been made between information flow …
integrity policies, but few rigorous connections have been made between information flow …
Eliminating cache-based timing attacks with instruction-based scheduling
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …
information without leaking this information. However, the presence of covert channels …
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may
be leaked by terminating accordingly. While this termination covert channel has limited …
be leaked by terminating accordingly. While this termination covert channel has limited …
Access control for mobile agents: The calculus of boxed ambients
M Bugliesi, G Castagna, S Crafa - ACM Transactions on Programming …, 2004 - dl.acm.org
Boxed Ambients are a variant of Mobile Ambients that result from dropping the open
capability and introducing new primitives for ambient communication. The new model of …
capability and introducing new primitives for ambient communication. The new model of …
Information flow security in dynamic contexts
We study information flow security in the setting of mobile agents. We propose a sufficient
condition to security named Persistent_BNDC. A process is Persistent_BNDC when every of …
condition to security named Persistent_BNDC. A process is Persistent_BNDC when every of …
Information Flow Control in Cyclic Process Networks
B van den Heuvel, F Derakhshan… - … European Conference on …, 2024 - research.rug.nl
Protection of confidential data is an important security consideration of today's applications.
Of particular concern is to guard against unintentional leakage to a (malicious) observer …
Of particular concern is to guard against unintentional leakage to a (malicious) observer …
Bridging language-based and process calculi security
Abstract Language-based and process calculi-based information security are well
developed fields of computer security. Although these fields have much in common, it is …
developed fields of computer security. Although these fields have much in common, it is …
Session logical relations for noninterference
Information flow control type systems statically restrict the propagation of sensitive data to
ensure end-to-end confidentiality. The property to be shown is noninterference, asserting …
ensure end-to-end confidentiality. The property to be shown is noninterference, asserting …
Using access control for secure information flow in a Java-like language
A Banerjee, DA Naumann - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Access control mechanisms are widely used with the intent of enforcing confidentiality and
other policies, but few formal connections have been made between information flow and …
other policies, but few formal connections have been made between information flow and …