Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 2012
DOI: 10.1145/2103656.2103669
|View full text |Cite
|
Sign up to set email alerts
|

A language for automatically enforcing privacy policies

Abstract: It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application's behavior adheres to policies about where sensitive values may flow. Unfortunately, privacy policies are difficult to manage because their global nature requires coordinated reasoning and enforcement. To address this problem, we describe a programming model that makes the system responsible for ensuring adherence to privacy policies. The pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 91 publications
(69 citation statements)
references
References 20 publications
0
61
0
Order By: Relevance
“…JEEVES; Yang, Yessenov & Solar-Lezama, 2012), the privacy status of variables can be declared, but whenever a statement is executed involving such a variable computation must be forked (at least conceptually and often in practice) to account for the different trajectories that the code may have taken based on protected values. These forks can be computationally 4 Note that we are not claiming that JAGS is the only language that meets these criterions and other languages such as STAN or PyMC3 could have been used.…”
Section: Analyzing Datamentioning
confidence: 99%
“…JEEVES; Yang, Yessenov & Solar-Lezama, 2012), the privacy status of variables can be declared, but whenever a statement is executed involving such a variable computation must be forked (at least conceptually and often in practice) to account for the different trajectories that the code may have taken based on protected values. These forks can be computationally 4 Note that we are not claiming that JAGS is the only language that meets these criterions and other languages such as STAN or PyMC3 could have been used.…”
Section: Analyzing Datamentioning
confidence: 99%
“…At the same time, Yang et al rst implemented Jeeves, a language allowing policy-agnostic programming [23]. Policy-agnostic programming takes the view that programs should be wri en without regard to a particular privacy policy, because as the policy changes, correctly updating program logic is cumbersome and error-prone.…”
Section: Related Workmentioning
confidence: 99%
“…Fabric fits into a substantial history of efforts to integrate information flow control into practical language-level programming abstractions; prior systems include SPARK/Ada [11], Jif and Jif/split [87,90,131,137], FlowCaml [113], Laminar [105], Aura [58], Swift [27], LIO [117], Jeeves [129], and Paragon [20]. These previous systems are either not distributed, or provide much more limited control over distributed computation.…”
Section: Related Workmentioning
confidence: 99%