Language-Based Information Erasure
- 6 July 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 241-254
- https://doi.org/10.1109/csfw.2005.19
Abstract
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This approach is constructive, relying on properties of monads and monad transformers ...Keywords
This publication has 34 references indexed in Scilit:
- Dynamic Security Labels and Noninterference (Extended Abstract)Published by Springer Nature ,2005
- Security policies for downgradingPublished by Association for Computing Machinery (ACM) ,2004
- A Type System for Robust DeclassificationElectronic Notes in Theoretical Computer Science, 2003
- Region-based memory management in cyclonePublished by Association for Computing Machinery (ACM) ,2002
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- Verifying secrets and relative secrecyPublished by Association for Computing Machinery (ACM) ,2000
- Region-Based Memory ManagementInformation and Computation, 1997
- Automatic verification of finite-state concurrent systems using temporal logic specificationsACM Transactions on Programming Languages and Systems, 1986
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976