Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

[PS][PS] An E cient Cryptographic Protocol Verifier Based on Prolog Rules

B Blanchet - 14th IEEE Computer Security Foundations Workshop …, 2001 - csl.sri.com
An E cient Cryptographic Protocol Veri er Based on Prolog Rules Page 1 An E cient
Cryptographic Protocol Veri er Based on Prolog Rules Bruno Blanchet INRIA Rocquencourt …

Resource interfaces

A Chakrabarti, L De Alfaro, TA Henzinger… - … Workshop on Embedded …, 2003 - Springer
We present a formalism for specifying component interfaces that expose component
requirements on limited resources. The formalism permits an algorithmic check if two or …

A classification of security properties for process algebras

R Focardi, R Gorrieri - Journal of Computer security, 1995 - content.iospress.com
Several information flow security definitions, proposed in the literature, are generalized and
adapted to the model of labelled transition systems. This very general model has been …

Classification of Security Properties: (Part I: Information Flow)

R Focardi, R Gorrieri - International School on Foundations of Security …, 2000 - Springer
In the recent years, many formalizations of security properties have been proposed, most of
which are based on different underlying models and are consequently difficult to compare. A …

[图书][B] Programming languages for information security

SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …

Analyzing security protocols with secrecy types and logic programs

M Abadi, B Blanchet - Journal of the ACM (JACM), 2005 - dl.acm.org
We study and further develop two language-based techniques for analyzing security
protocols. One is based on a typed process calculus; the other, on untyped logic programs …

A generic type system for the pi-calculus

A Igarashi, N Kobayashi - Theoretical Computer Science, 2004 - Elsevier
We propose a general, powerful framework of type systems for the π-calculus, and show that
we can obtain as its instances a variety of type systems guaranteeing non-trivial properties …

Noninterference for concurrent programs and thread systems

G Boudol, I Castellani - Theoretical Computer Science, 2002 - Elsevier
We propose a type system to ensure the property of noninterference in a system of
concurrent programs, described in a standard imperative language enriched with …

Type-based information flow analysis for the π-calculus

N Kobayashi - Acta Informatica, 2005 - Springer
We propose a new type system for information flow analysis for the π-calculus. As
demonstrated by recent studies, information about whether each communication succeeds …