Observational determinism for concurrent program security

S Zdancewic, AC Myers - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Noninterference is a property of sequential programs that is useful for expressing security
policies for data confidentiality and integrity. However, extending noninterference to …

Stack-based access control and secure information flow

A Banerjee, DA Naumann - Journal of functional programming, 2005 - cambridge.org
Access control mechanisms are often used with the intent of enforcing confidentiality and
integrity policies, but few rigorous connections have been made between information flow …

Eliminating cache-based timing attacks with instruction-based scheduling

D Stefan, P Buiras, EZ Yang, A Levy, D Terei… - … –ESORICS 2013: 18th …, 2013 - Springer
Abstract Information flow control allows untrusted code to access sensitive and trustworthy
information without leaking this information. However, the presence of covert channels …

Addressing covert termination and timing channels in concurrent information flow systems

D Stefan, A Russo, P Buiras, A Levy, JC Mitchell… - ACM SIGPLAN …, 2012 - dl.acm.org
When termination of a program is observable by an adversary, confidential information may
be leaked by terminating accordingly. While this termination covert channel has limited …

Access control for mobile agents: The calculus of boxed ambients

M Bugliesi, G Castagna, S Crafa - ACM Transactions on Programming …, 2004 - dl.acm.org
Boxed Ambients are a variant of Mobile Ambients that result from dropping the open
capability and introducing new primitives for ambient communication. The new model of …

Information flow security in dynamic contexts

R Focardi, S Rossi - Journal of Computer Security, 2006 - content.iospress.com
We study information flow security in the setting of mobile agents. We propose a sufficient
condition to security named Persistent_BNDC. A process is Persistent_BNDC when every of …

Information Flow Control in Cyclic Process Networks

B van den Heuvel, F Derakhshan… - … European Conference on …, 2024 - research.rug.nl
Protection of confidential data is an important security consideration of today's applications.
Of particular concern is to guard against unintentional leakage to a (malicious) observer …

Bridging language-based and process calculi security

R Focardi, S Rossi, A Sabelfeld - … , FOSSACS 2005, Held as Part of the …, 2005 - Springer
Abstract Language-based and process calculi-based information security are well
developed fields of computer security. Although these fields have much in common, it is …

Session logical relations for noninterference

F Derakhshan, S Balzer, L Jia - 2021 36th Annual ACM/IEEE …, 2021 - ieeexplore.ieee.org
Information flow control type systems statically restrict the propagation of sensitive data to
ensure end-to-end confidentiality. The property to be shown is noninterference, asserting …

Using access control for secure information flow in a Java-like language

A Banerjee, DA Naumann - 16th IEEE Computer Security …, 2003 - ieeexplore.ieee.org
Access control mechanisms are widely used with the intent of enforcing confidentiality and
other policies, but few formal connections have been made between information flow and …