메뉴 건너뛰기




Volumn , Issue , 2011, Pages 165-179

Verification of information flow and access control policies with dependent types

Author keywords

Access control; Information flow; Type theory

Indexed keywords

FORMAL LANGUAGES; MEMORY ARCHITECTURE; SECURITY SYSTEMS; THEOREM PROVING;

EID: 80051991049     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.12     Document Type: Conference Paper
Times cited : (74)

References (47)
  • 1
    • 33745806932 scopus 로고    scopus 로고
    • A logic for information flow in object-oriented programs
    • T. Amtoft, S. Bandhakavi, and A. Banerjee, "A logic for information flow in object-oriented programs," in POPL, 2006.
    • (2006) POPL
    • Amtoft, T.1    Bandhakavi, S.2    Banerjee, A.3
  • 2
    • 0033281265 scopus 로고    scopus 로고
    • Proof-carrying authentication
    • A. W. Appel and E. W. Felten, "Proof-carrying authentication," in ACM CCS, 1999.
    • (1999) ACM CCS
    • Appel, A.W.1    Felten, E.W.2
  • 3
    • 34548715313 scopus 로고    scopus 로고
    • Gradual release: Unifying declassification, encryption and key release policies
    • A. Askarov and A. Sabelfeld, "Gradual release: Unifying declassification, encryption and key release policies," in IEEE Symp. Security and Privacy, 2007.
    • (2007) IEEE Symp. Security and Privacy
    • Askarov, A.1    Sabelfeld, A.2
  • 4
    • 85040944657 scopus 로고    scopus 로고
    • A semantic framework for declassification and endorsement
    • A. Askarov and A. Myers, "A semantic framework for declassification and endorsement," in ESOP, 2010.
    • (2010) ESOP
    • Askarov, A.1    Myers, A.2
  • 5
    • 77950852652 scopus 로고    scopus 로고
    • Distributed programming with distributed authorization
    • K. Avijit, A. Datta, and R. Harper, "Distributed programming with distributed authorization," in TLDI, 2010.
    • (2010) TLDI
    • Avijit, K.1    Datta, A.2    Harper, R.3
  • 6
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control and secure information flow
    • A. Banerjee and D. A. Naumann, "Stack-based access control and secure information flow," JFP, vol. 15, no. 2, pp. 131-177, 2005.
    • (2005) JFP , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 9
    • 2442575906 scopus 로고    scopus 로고
    • Simple relational correctness proofs for static analyses and program transformations
    • N. Benton, "Simple relational correctness proofs for static analyses and program transformations," in POPL, 2004.
    • (2004) POPL
    • Benton, N.1
  • 10
    • 79952125780 scopus 로고    scopus 로고
    • Verifying stateful programs with substructural state and hoare types
    • J. Borgstrom, J. Chen, and N. Swamy, "Verifying stateful programs with substructural state and Hoare types," in PLPV, 2011.
    • (2011) PLPV
    • Borgstrom, J.1    Chen, J.2    Swamy, N.3
  • 11
    • 85177685244 scopus 로고    scopus 로고
    • Roles, stacks, histories: A triple for hoare
    • forthcoming
    • J. Borgström, A. D. Gordon, and R. Pucella, "Roles, stacks, histories: A triple for Hoare," JFP, forthcoming.
    • JFP
    • Borgström, J.1    Gordon, A.D.2    Pucella, R.3
  • 12
    • 77950913806 scopus 로고    scopus 로고
    • Paralocks: Role-based information flow control and beyond
    • N. Broberg and D. Sands, "Paralocks: role-based information flow control and beyond," in POPL, 2010.
    • (2010) POPL
    • Broberg, N.1    Sands, D.2
  • 13
    • 85177680280 scopus 로고    scopus 로고
    • PCAL: Language support for proof-carrying authorization systems
    • A. Chaudhuri and D. Garg, "PCAL: Language support for proof-carrying authorization systems," in ESORICS, 2009.
    • (2009) ESORICS
    • Chaudhuri, A.1    Garg, D.2
  • 14
    • 14844300105 scopus 로고    scopus 로고
    • Security policies for downgrading
    • S. Chong and A. C. Myers, "Security policies for downgrading," in ACM CCS, 2004.
    • (2004) ACM CCS
    • Chong, S.1    Myers, A.C.2
  • 15
    • 28144458511 scopus 로고    scopus 로고
    • Language-based information erasure
    • -, "Language-based information erasure," in CSFW, 2005.
    • (2005) CSFW
    • Chong, S.1    Myers, A.C.2
  • 16
    • 51749115761 scopus 로고    scopus 로고
    • End-to-end enforcement of erasure and declassification
    • -, "End-to-end enforcement of erasure and declassification," in CSF, 2008.
    • (2008) CSF
    • Chong, S.1    Myers, A.C.2
  • 17
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning, "A lattice model of secure information flow," CACM, vol. 19, no. 5, pp. 236-242, 1976.
    • (1976) CACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.1
  • 19
    • 3142732675 scopus 로고
    • A type-theoretic approach to higher-order modules with sharing
    • R. Harper and M. Lillibridge, "A type-theoretic approach to higher-order modules with sharing," in POPL, 1994.
    • (1994) POPL
    • Harper, R.1    Lillibridge, M.2
  • 21
    • 70450285315 scopus 로고    scopus 로고
    • Encoding information flow in aura
    • L. Jia and S. Zdancewic, "Encoding information flow in Aura," in PLAS, 2009.
    • (2009) PLAS
    • Jia, L.1    Zdancewic, S.2
  • 22
    • 0028013809 scopus 로고
    • Manifest types, modules, and separate compilation
    • X. Leroy, "Manifest types, modules, and separate compilation," in POPL, 1994.
    • (1994) POPL
    • Leroy, X.1
  • 23
    • 77949484835 scopus 로고    scopus 로고
    • Arrows for secure information flow
    • P. Li and S. Zdancewic, "Arrows for secure information flow," Theoretical Comput. Sci., vol. 411, no. 19, pp. 1974-1994, 2010.
    • (2010) Theoretical Comput. Sci. , vol.411 , Issue.19 , pp. 1974-1994
    • Li, P.1    Zdancewic, S.2
  • 24
  • 25
    • 57049139521 scopus 로고    scopus 로고
    • LogiCal project, INRIA version 8.2. [Online]
    • The Coq development team, The Coq proof assistant reference manual, LogiCal project, INRIA, 2009, version 8.2. [Online]. Available: http://coq.inria.fr
    • (2009) The Coq Proof Assistant Reference Manual
  • 26
    • 0024038082 scopus 로고
    • Abstract types have existential type
    • J. C. Mitchell and G. D. Plotkin, "Abstract types have existential type," ACM Trans. Prog. Lang. Syst., vol. 10, no. 3, pp. 470-502, 1988.
    • (1988) ACM Trans. Prog. Lang. Syst. , vol.10 , Issue.3 , pp. 470-502
    • Mitchell, J.C.1    Plotkin, G.D.2
  • 27
    • 78249262079 scopus 로고    scopus 로고
    • Security-typed programming within dependently-typed programming
    • J. Morgenstern and D. Licata, "Security-typed programming within dependently-typed programming," in ICFP, 2010.
    • (2010) ICFP
    • Morgenstern, J.1    Licata, D.2
  • 28
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. C. Myers, "JFlow: Practical mostly-static information flow control," in POPL, 1999.
    • (1999) POPL
    • Myers, A.C.1
  • 31
    • 55249085443 scopus 로고    scopus 로고
    • Hoare type theory, polymorphism and separation
    • A. Nanevski, J. G. Morrisett, and L. Birkedal, "Hoare type theory, polymorphism and separation," JFP, vol. 18, no. 5-6, pp. 865-911, 2008.
    • (2008) JFP , vol.18 , Issue.5-6 , pp. 865-911
    • Nanevski, A.1    Morrisett, J.G.2    Birkedal, L.3
  • 32
    • 77950885453 scopus 로고    scopus 로고
    • Structuring the verification of heap-manipulating programs
    • A. Nanevski, V. Vafeiadis, and J. Berdine, "Structuring the verification of heap-manipulating programs," in POPL, 2010.
    • (2010) POPL
    • Nanevski, A.1    Vafeiadis, V.2    Berdine, J.3
  • 34
    • 0027271331 scopus 로고
    • Imperative functional programming
    • S. L. Peyton Jones and P. Wadler, "Imperative functional programming," in POPL, 1993.
    • (1993) POPL
    • Peyton Jones, S.L.1    Wadler, P.2
  • 35
    • 0036051192 scopus 로고    scopus 로고
    • Separation logic: A logic for shared mutable data structures
    • J. C. Reynolds, "Separation logic: a logic for shared mutable data structures," in LICS, 2002.
    • (2002) LICS
    • Reynolds, J.C.1
  • 36
    • 80052003246 scopus 로고    scopus 로고
    • A library for lightweight information-flow security in haskell
    • A. Russo, K. Claessen, and J. Hughes, "A library for lightweight information-flow security in Haskell," in Haskell Symposium, 2008.
    • (2008) Haskell Symposium
    • Russo, A.1    Claessen, K.2    Hughes, J.3
  • 37
    • 77954931906 scopus 로고    scopus 로고
    • Tracking information flow in dynamic tree structures
    • A. Russo, A. Sabelfeld, and A. Chudnov, "Tracking information flow in dynamic tree structures," in ESORICS, 2009.
    • (2009) ESORICS
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 38
    • 0002185174 scopus 로고    scopus 로고
    • A PER model of secure information flow in sequential programs
    • A. Sabelfeld and D. Sands, "A PER model of secure information flow in sequential programs," in ESOP, 1999.
    • (1999) ESOP
    • Sabelfeld, A.1    Sands, D.2
  • 39
    • 70350548311 scopus 로고    scopus 로고
    • Declassification: Dimensions and principles
    • -, "Declassification: Dimensions and principles," Journal of Computer Security, vol. 17, no. 5, pp. 517-548, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.5 , pp. 517-548
    • Sabelfeld, A.1    Sands, D.2
  • 40
    • 0346925420 scopus 로고    scopus 로고
    • Fine-grained information flow analysis for a λ-calculus with sum types
    • V. Simonet, "Fine-grained information flow analysis for a λ-calculus with sum types," in CSFW, 2002.
    • (2002) CSFW
    • Simonet, V.1
  • 41
    • 85040949627 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in fine
    • N. Swamy, J. Chen, and R. Chugh, "Enforcing stateful authorization and information flow policies in Fine," in ESOP, 2010.
    • (2010) ESOP
    • Swamy, N.1    Chen, J.2    Chugh, R.3
  • 42
    • 50249112702 scopus 로고    scopus 로고
    • Fable: A language for enforcing user-defined security policies
    • full version: Technical report CS-TR-4895, Univ. Maryland
    • N. Swamy, B. J. Corcoran, and M. Hicks, "Fable: A language for enforcing user-defined security policies," in IEEE Symp. Security and Privacy, 2008, full version: Technical report CS-TR-4895, Univ. Maryland.
    • (2008) IEEE Symp. Security and Privacy
    • Swamy, N.1    Corcoran, B.J.2    Hicks, M.3
  • 43
    • 33947711323 scopus 로고    scopus 로고
    • Managing policy updates in security-typed languages
    • N. Swamy, M. Hicks, S. Tse, and S. Zdancewic, "Managing policy updates in security-typed languages," in CSFW, 2006.
    • (2006) CSFW
    • Swamy, N.1    Hicks, M.2    Tse, S.3    Zdancewic, S.4
  • 44
    • 33746340860 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • T. Terauchi and A. Aiken, "Secure information flow as a safety problem," in SAS, 2005.
    • (2005) SAS
    • Terauchi, T.1    Aiken, A.2
  • 45
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • D. M. Volpano, C. E. Irvine, and G. Smith, "A sound type system for secure flow analysis," Journal of Computer Security, vol. 4, no. 2/3, pp. 167-188, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 167-188
    • Volpano, D.M.1    Irvine, C.E.2    Smith, G.3
  • 46
    • 34047152892 scopus 로고    scopus 로고
    • Relational separation logic
    • DOI 10.1016/j.tcs.2006.12.036, PII S0304397506009261
    • H. Yang, "Relational separation logic," Theoretical Comput. Sci., vol. 375, pp. 308-334, 2007. (Pubitemid 46528654)
    • (2007) Theoretical Computer Science , vol.375 , Issue.1-3 , pp. 308-334
    • Yang, H.1
  • 47
    • 1442332519 scopus 로고    scopus 로고
    • A semantic basis for local reasoning
    • H. Yang and P. W. O'Hearn, "A semantic basis for local reasoning," in FoSSaCS, 2002.
    • (2002) FoSSaCS
    • Yang, H.1    O'Hearn, P.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.