Declassification

Known as: Declassified documents, Declassify 
Declassification is the process of documents that used to be classified as secret ceasing to be so restricted, often under the principle of freedom… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We propose a novel mechanism for enforcing information flow policies with support for declassification on event-driven programs… (More)
  • figure 1
  • figure 2
Is this relevant?
2011
2011
We explore the inference of expressive human-readable declassification policies as a step towards providing practical tools and… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper provides a way to specify expressive declassification policies, in particular, when, what, and where policies that… (More)
Is this relevant?
2008
2008
Formalizing appropriate information policies that authorize some controlled form of information release, and providing sound… (More)
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Information security has a challenge to address: enabling information-flow controls with expressive information release (or… (More)
  • figure 2
  • figure 3
  • figure 6
  • figure 7
  • figure 9
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Security properties based on information flow, such as noninterference, provide strong guarantees that confidentiality is… (More)
Is this relevant?