Typing Secure Information Flow: Declassification and Mobility
نویسندگان
چکیده
xvii Résumé (in French) xix Synthèse (in French) xxi Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Typage du flux d’information sûr . . . . . . . . . . . . . . . . . . xxi Problèmes abordés . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Contenu de la thèse . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv Non-interférence en environnement concurrent . . . . . . . . . . . xxv Non-divulgation et déclassification . . . . . . . . . . . . . . . . . xxv Non-divulgation pour du code mobile . . . . . . . . . . . . . . . . xxvi Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Contributions principales et travaux futurs . . . . . . . . . . . . xxvi Remarques finales . . . . . . . . . . . . . . . . . . . . . . . . . . xxix
منابع مشابه
Typing access control and secure information flow in sessions
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents information leaks due to the specific cont...
متن کاملSecure Information Flow in the Orc Concurrent Programming Language Project Report
Orc is a concurrent, functional-like programming language. We extend Orc’s type system with secure typing, to control the flow of information through programs according to a security policy. This policy is encoded in a lattice of labels that can be applied to values. The partial order of labels specifies the allowed information flows. The impact of Orc’s design and of concurrency in general are...
متن کاملType Abstraction for Relaxed Noninterference
Information-flow security typing statically prevents confidential information to leak to public channels. The fundamental information flow property, known as noninterference, states that a public observer cannot learn anything from private data. As attractive as it is from a theoretical viewpoint, noninterference is impractical: real systems need to intentionally declassify some information, se...
متن کاملType-Based Distributed Access Control
The Key-Based Decentralized Label Model (KDLM) is a type system that combines a weak form of information flow control, termed distributed access control in the article, with typed cryptographic operations. The motivation is to have a type system that ensures access control while giving the application the responsibility to secure network communications, and to do this safely. KDLM introduces th...
متن کاملDependency-Based Information Flow Analysis with Declassification in a Program Logic
We present a deductive approach for the analysis of secure information flows with support for fine-grained policies that include declassifications in the form of delimited information release. By explicitly tracking the dependencies of program locations as a computation history, we maintain high precision, while avoiding the need for comparing independent program runs. By considering an explici...
متن کامل