2012
DOI: 10.1145/2103621.2103669
|View full text |Cite
|
Sign up to set email alerts
|

A language for automatically enforcing privacy policies

Abstract: It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application's behavior adheres to policies about where sensitive values may flow. Unfortunately, privacy policies are difficult to manage because their global nature requires coordinated reasoning and enforcement. To address this problem, we describe a programming model that makes the system responsible for ensuring adherence to privacy policies. The pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
31
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(31 citation statements)
references
References 24 publications
0
31
0
Order By: Relevance
“…NICE-PySE [8] and Commuter [12] both implement library-based symbolic execution in Python, but only for particular domain-specific languages. Yang et al [36] and Köskal et al [21] use the same technique in Scala, but to enforce security policies and perform constraint programming, respectively. Rosette [35] uses a library to symbolically execute Racket for verification and program synthesis.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…NICE-PySE [8] and Commuter [12] both implement library-based symbolic execution in Python, but only for particular domain-specific languages. Yang et al [36] and Köskal et al [21] use the same technique in Scala, but to enforce security policies and perform constraint programming, respectively. Rosette [35] uses a library to symbolically execute Racket for verification and program synthesis.…”
Section: Related Workmentioning
confidence: 99%
“…Resin [37] is a runtime system that enforces information flow policies attached to data objects; it has been successfully applied to web applications. Jeeves [36], a similar language for enforcing information flow policies, has also been applied to the web. Jif [23], an extension of Java, also supports checking policies at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, there are quite a few programming languages and tools aimed at supporting information-flow secure programming [2, 3,7,30], as well as information-flow tracking tools for the client side of web applications [6,8,14]. We foresee a future where such tools will cooperate with proof assistants to offer light-weight guarantees for free and stronger guarantees (like the ones we proved in this paper) on a need basis.…”
Section: Related Workmentioning
confidence: 93%
“…Control of declassification is limited to where in the program declassification may occur. Jeeves [64] extends a core language for functionality with a language for flexible security policies. RF [11] uses a relational Hoare logic to reason about 2-safety properties of probabilistic programs, including language-based notions of information flow security.…”
Section: Related Workmentioning
confidence: 99%