On the Rôle of Abstract Non-interference in Language-Based Security

نویسنده

  • Isabella Mastroeni
چکیده

Non-Interference [Giacobazzi & Mastroeni ’04] H Secret H External observer Secret H Public L

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proof System for Abstract Non-interference

In this paper we provide a inductive proof system for abstract non-interference which fits in every field of computer science where we are interested in observing how different program’s data interfere with each other. The idea is to abstract from language-based security and consider generically data as distinguished between internal (that has to be protected by the program) and observable. In ...

متن کامل

Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata

Secure Information-flow Analysis for Automata Roberto Giacobazzi and Isabella Mastroeni Dipartimento di Informatica Università di Verona, Italy (roberto.giacobazzi@ | mastroeni@sci.)univr.it Abstract. Abstract non-interference has been introduced as a weakening non-interference which models attackers as abstract interpretations (i.e., static analyzers) of programming language semantics. In this...

متن کامل

Native Language Interference in Writing: A case study of Thai EFL learners

AbstractThe interference of the native language in acquiring a foreign language is unavoidable. In an attempt to explore the phenomenon why this occurs, the study was conducted in English as a foreign language writing. The study also investigated how the native language interference occurred in the writing process. In fact, this qualitative study explored the reasons and the process of na...

متن کامل

Proving Abstract Non-interference

In this paper we introduce a compositional proof-system for certifying abstract non-interference in programming languages. Certifying abstract noninterference means proving that no unauthorized flow of information is observable by the attacker from confidential to public data. The properties of the computation that an attacker may observe are specified as an abstract domain. Assertions specify ...

متن کامل

Domain Separation by Construction

Language-based approaches to security typically use static type systems to control information flow, relying on type inference to distinguish secure programs from insecure ones. This paper advocates a novel approach to language-based security: by structuring software with monads (a form of abstract data type for effects), we are able to maintain separation of effects by construction. The thesis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005