2003
DOI: 10.1109/jsac.2002.806121
|View full text |Cite
|
Sign up to set email alerts
|

Language-based information-flow security

Abstract: Abstract-Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow.Conventional security mechanisms such as access control and encryption do not directly address the enforcement of infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
1,249
0
12

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 1,561 publications
(1,262 citation statements)
references
References 127 publications
1
1,249
0
12
Order By: Relevance
“…We refer to a survey [42] for generally related work and focus on immediately related approaches to monitoring.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…We refer to a survey [42] for generally related work and focus on immediately related approaches to monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…Information-flow controls offer a promising approach to security enforcement, where the goal is to prevent disclosure of sensitive data by applications [42]. Several informationflow tools have been developed for mainstream languages, e.g., Java-based Jif [35], Caml-based FlowCaml [46], and Ada-based SPARK Examiner [8], [11], as well as case studies [46], [3], [23], [13], [12], [15], [38].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…While there have been many efforts aimed at preventing improper flows completely (see for example, the survey by Sabelfeld and Myers (2003)), it has long been recognized that perfection is often impossible in practice. A basic example is a login program -whenever it rejects an incorrect password, it unavoidably reveals that the secret password differs from the one that was entered.…”
mentioning
confidence: 99%