Language-based information-flow security
Top Cited Papers
- 14 January 2003
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 21 (1), 5-19
- https://doi.org/10.1109/jsac.2002.806121
Abstract
Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges.Keywords
This publication has 92 references indexed in Scilit:
- Noninterference for concurrent programs and thread systemsTheoretical Computer Science, 2002
- A semantic approach to secure information flowScience of Computer Programming, 2000
- Secrecy by typing in security protocolsJournal of the ACM, 1999
- Trust in the λ-calculusJournal of Functional Programming, 1997
- Secrecy by typing in security protocolsLecture Notes in Computer Science, 1997
- A general theory of composition for a class of "possibilistic" propertiesIEEE Transactions on Software Engineering, 1996
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Information transmission in computational systemsACM SIGOPS Operating Systems Review, 1977
- HYDRACommunications of the ACM, 1974
- Memoryless subsystemsThe Computer Journal, 1974