Learn More
One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked to the attacker also through covert channels. It is very reasonable to(More)
  • Johan Agat
  • Implementation of Functional Languages
  • 1997
We have set out to explore a type based approach to register allocation for purely functional languages. To lay a theoretical ground for that work, we have rst developed a functional typed intermediate language with explicit register usage that we present in this paper. The language, which is a lambda calculus with avours of assembly language, is able to(More)
When it comes to granting mobile code access to conndential information , great care has to be taken if the code originates from an untrused source and the information is to remain conndential. If the program has access to the Internet during its execution, it has the possibility to leak information in many subtle ways, including through its temporal(More)
Recent interest in methods for certifying programs for secure information flow (noninterference) have failed to raise a key question: can efficient algorithms be written so as to satisfy the requirements of secure information flow? In this paper we discuss how algorithms for searching and sorting can be adapted to work on collections of secret data without(More)
  • 1