Secure information flow and pointer con .nement in a java-like language

@article{Banerjee2002SecureIF,
  title={Secure information flow and pointer con .nement in a java-like language},
  author={A. Banerjee and D. Naumann},
  journal={Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15},
  year={2002},
  pages={239-}
}
  • A. Banerjee, D. Naumann
  • Published 2002
  • Computer Science
  • Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15
We consider a sequential object-oriented language with pointers and mutable state, private fields and class-based visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrainedby security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure information flow. 
A Design for a Security-Typed Language with Certificate-Based Declassification
Observational determinism for concurrent program security
  • S. Zdancewic, A. Myers
  • Computer Science
  • 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.
  • 2003
Stack-based access control and secure information flow
Verifying a Secure Information Flow Analyzer
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 49 REFERENCES
A Sound Type System for Secure Flow Analysis
Certification of programs for secure information flow
Representation independence, confinement and access control [extended abstract]
Secure information flow in a multi-threaded imperative language
Confined types in Java
Confinement Properties for Multi-Threaded Programs
A Type-Based Approach to Program Security
JFlow: practical mostly-static information flow control
A core calculus of dependency
A new type system for secure information flow
  • Geoffrey Smith
  • Computer Science
  • Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
  • 2001
...
1
2
3
4
5
...