Providing flexibility in information flow control for object oriented systems

@inproceedings{Ferrari1997ProvidingFI,
  title={Providing flexibility in information flow control for object oriented systems},
  author={Elena Ferrari and Pierangela Samarati and Elisa Bertino and Sushil Jajodia},
  booktitle={IEEE Symposium on Security and Privacy},
  year={1997}
}
This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by allowing exceptions to the restrictions stat ed by the authorizations. Exceptions are specified by means of waivers associated with methods. Two kinds of waivers are supported: invoke-waivers, specifying exceptions applic able during a method’s execution… CONTINUE READING
Highly Cited
This paper has 93 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 57 extracted citations

Collaborative Verification of Information Flow for a High-Assurance App Store

ACM Conference on Computer and Communications Security • 2014
View 1 Excerpt

The hybrid model for web services security access control and information flow control

8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) • 2013
View 1 Excerpt

Using Partial Ordered Numbers to Control Information Flows

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement • 2011
View 2 Excerpts

Static Information Flow Analysis with Handling of Implicit Flows and a Study on Effects of Implicit Flows vs Explicit Flows

2010 14th European Conference on Software Maintenance and Reengineering • 2010
View 3 Excerpts

Declassification: Dimensions and principles

Journal of Computer Security • 2009
View 1 Excerpt

94 Citations

051015'98'03'09'15
Citations per Year
Semantic Scholar estimates that this publication has 94 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Providing Flexibility in Information Flow Control for Object-Oriented Systems

E. Ferrari, P. Samarati, E. Bertino, S. Jajodia
Tech. Report, Dip. di Scienze dell’ Informazione, • 1996
View 2 Excerpts

Integrating an Object-Oriented Data Model with Multilevel Security

IEEE Symposium on Security and Privacy • 1990
View 2 Excerpts

On the need for a third form of access control

R. Graubart
InProc. of the12th Nat. Computer Security Conf., • 1989
View 1 Excerpt

Limiting the Damage Potential of Discretionary Trojan Horses

1987 IEEE Symposium on Security and Privacy • 1987
View 2 Excerpts

A partial solution to the discretionary Trojan horse problem

W. E. Boebert, C. T. Ferguson
Proc. of the8th Nat. Computer Security • 1985
View 2 Excerpts

Access Flow: A Protection Model which Integrates Access Control and Information Flow

1981 IEEE Symposium on Security and Privacy • 1981
View 2 Excerpts

Similar Papers

Loading similar papers…