Refactoring programs to secure information flows

@inproceedings{Smith2006RefactoringPT,
  title={Refactoring programs to secure information flows},
  author={Scott F. Smith and Mark Thober},
  booktitle={PLAS},
  year={2006}
}
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of andchanges to the program. In this paper we show how refactoring programs into distinct components of high and low security is a useful methodology to aid in the production of programs with sound information flow policies. Our methodology proceeds as follows. Given a program with no information flow controls, a program sliceris used to identify code that depends on high… CONTINUE READING
22 Citations
7 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-7 of 7 references

Secure computer system: Unified exposition and multics interpretation

  • David E. Bell, Leonard J. LaPadula
  • Technical Report MTR-2997,
  • 1975
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…