2008
DOI: 10.1145/1543134.1411289
|View full text |Cite
|
Sign up to set email alerts
|

A library for light-weight information-flow security in haskell

Abstract: Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpose, leading to special-purpose languages that guarantee information-flow security in programs. However, rather than producing a new language from scratch, information-flow security can also be provided as a library. This has been done previously in Haskell using the arrow framework. In this paper, we show that arrows are not necessary to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 24 publications
(34 citation statements)
references
References 26 publications
0
34
0
Order By: Relevance
“…The implementation of the library and the examples described in this paper are publicly available in (Russo et al 2008a). The well-known concept of monads together with the light-weight and flexible characteristic of our approach makes the library suitable to build Haskell applications where confidentiality of data is an issue.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The implementation of the library and the examples described in this paper are publicly available in (Russo et al 2008a). The well-known concept of monads together with the light-weight and flexible characteristic of our approach makes the library suitable to build Haskell applications where confidentiality of data is an issue.…”
Section: Discussionmentioning
confidence: 99%
“…For any type A, and values a1, a2 :: A, a function f :: Sec H A -> Bool will produce the same result for arguments a1 and a2. See (Russo et al 2008a) for more details.…”
Section: The Sec Monadmentioning
confidence: 99%
“…tainting user input to avoid SQL injection attacks. We represent information flow using well-established techniques, such as indexed monads [36] and applicative functors [38].…”
Section: Introductionmentioning
confidence: 99%
“…Recent research has shown that a static approach to program validation through information flow control is the preferred, secure way to check programs. Dynamic techniques are not as effective because it is too difficult to check all the different paths that may come from a program and the side effect issues [18]. This is in line with our static Program Verifying Authority which checks the safety of programs before they are run.…”
Section: Related and Future Workmentioning
confidence: 84%