Learn More
One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked to the attacker also through covert channels. It is very reasonable to(More)
Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? In this paper we discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without(More)
When it comes to granting mobile code access to conndential information , great care has to be taken if the code originates from an untrused source and the information is to remain conndential. If the program has access to the Internet during its execution, it has the possibility to leak information in many subtle ways, including through its temporal(More)
  • 1