2018
DOI: 10.1016/j.jlamp.2018.04.001
|View full text |Cite
|
Sign up to set email alerts
|

A secrecy-preserving language for distributed and object-oriented systems

Abstract: In modern systems it is often necessary to distinguish between confidential (low-level) and non-confidential (high-level) information. Confidential information should be protected and not communicated or shared with low-level users. The non-interference policy is an information flow policy stipulating that low-level viewers should not be able to observe a difference between any two executions with the same low-level inputs. Only high-level viewers may observe confidential output. This is a non-trivial challeng… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…We propose a small core language, based on Creol [7], centered around a few basic statements. It has a compositional semantics which is beneficial to analysis [7,8]. The language is imperative and strongly typed, with data types for data structure locally inside a class.…”
Section: Embedding Policy With Program Constructsmentioning
confidence: 99%
See 1 more Smart Citation
“…We propose a small core language, based on Creol [7], centered around a few basic statements. It has a compositional semantics which is beneficial to analysis [7,8]. The language is imperative and strongly typed, with data types for data structure locally inside a class.…”
Section: Embedding Policy With Program Constructsmentioning
confidence: 99%
“…Here Γ is a mapping from program variable names to policy sets, such that the policy set of a variable in a given state gives an upper bound of the permitted operations. In order to deal with branches of ifand while-statements where the context policy is influenced by that of the if-and while-tests, Γ uses an additional variable pc (the program context) reflecting the current branching policy (as in [8]). Note that the rules are right-constructive in the sense that Γ can be constructed from Γ and s.…”
Section: An Effect System For Privacymentioning
confidence: 99%
“…2. Formal languages, coupled with a compiler, such as the one developed by Ramezanifarkhani et al [31], possess the potential to make privacy policies statically verifiable. These languages have the potential to statically enforce data protection stronger than the lightweight analysis proposed.…”
Section: Related Workmentioning
confidence: 99%
“…As far as we know, studies of secrecy, within the logical tradition, are confined to issues related to system security [5,6,7,8,9,10,11,12,13,14]. In such studies, a secret is presented as a true piece of information about an agent/a system which is not known by a certain adversary group; the focus is mostly on identifying effective, and often subtle, methods for keeping the secret.…”
Section: Introductionmentioning
confidence: 99%