Information Flow Analysis for Fail-Secure Devices
نویسندگان
چکیده
منابع مشابه
Information Flow Analysis for Fail-Secure Devices
(2005) Information flow analysis for fail-secure devices. Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our ...
متن کاملPrinciples of Secure Information Flow Analysis
In today's world of the Internet, the WorldWide Web, and Google, information is more accessible than ever before. An unfortunate corollary is that it is harder than ever to protect the privacy of sensitive information. In this paper, we explore a technique called secure information flow analysis. Suppose that some sensitive information is stored on a computer system. How can we prevent it from ...
متن کاملArrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, l...
متن کاملSecure Personal Information Management for Mobile Devices
More than six decades after Vannevar Bush put forward Memex [3], his vision of a personal information management (PIM) framework, most computer users are still constrained by a rigid hierarchical file organization, where the semantic relationships among data are not emphasized. The semantic desktop leverages the potential of the semantic web to address the challenges of complex PI spaces, which...
متن کاملJava Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Information flow policy can ensure data confidentiality, however, conventional information flow analysis mainly focused on the programs written in high-level programming languages and is generally performed by type checking ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Computer Journal
سال: 2005
ISSN: 0010-4620,1460-2067
DOI: 10.1093/comjnl/bxh056