Designing a Security-typed Language with Certificate-based Declassification

  title={Designing a Security-typed Language with Certificate-based Declassification},
  author={Stephen Tse and Steve Zdancewic},
This paper presents the design of a programming language that supports information-flow security policies and certificate-based declassification. The language uses monadic information-flow annotations in the style of Abadi et al.’s dependency core calculus, and has an effects system and fixpoints. The type system conflates security concepts such as labels, principals, and privileges with abstract types, allowing a uniform treatment of lattice structures throughout the language. Myers’ and… CONTINUE READING


Publications citing this paper.
Showing 1-7 of 7 extracted citations

SIF: Enforcing Confidentiality and Integrity in Web Applications

USENIX Security Symposium • 2007
View 5 Excerpts
Highly Influenced

End-to-End Enforcement of Erasure and Declassification

2008 21st IEEE Computer Security Foundations Symposium • 2008
View 1 Excerpt

Managing policy updates in security-typed languages

19th IEEE Computer Security Foundations Workshop (CSFW'06) • 2006
View 1 Excerpt

Run-time principals in information-flow type systems

IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 • 2004
View 2 Excerpts


Publications referenced by this paper.
Showing 1-10 of 56 references

Run-time Principals in Information-flow Type Systems

IEEE Symposium on Security and Privacy • 2004
View 10 Excerpts
Highly Influenced

Information flow inference for ML

ACM Trans. Program. Lang. Syst. • 2003
View 6 Excerpts
Highly Influenced

Language-based information-flow security

IEEE Journal on Selected Areas in Communications • 2003
View 16 Excerpts
Highly Influenced

Computational Lambda-Calculus and Monads

LICS • 1989
View 4 Excerpts
Highly Influenced

The marriage of effects and monads

ACM Trans. Comput. Log. • 2003
View 5 Excerpts
Highly Influenced

Complete, Safe Information Flow with Decentralized Labels

IEEE Symposium on Security and Privacy • 1998
View 7 Excerpts
Highly Influenced