2005
DOI: 10.1007/11537311_32
|View full text |Cite
|
Sign up to set email alerts
|

A Type System for Computationally Secure Information Flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(53 citation statements)
references
References 25 publications
0
53
0
Order By: Relevance
“…Consequently, certain security APIs cannot be analysed using some of these existing systems. For example, the IBM 4758 [3] has one internal master key that is used to encrypt all other keys which are then stored on the attached host, therefore rule sets in which the result of a decryption cannot be used as a key (e.g., [17]) are unable to analyse the security API for that device.…”
Section: Discussionmentioning
confidence: 99%
“…Consequently, certain security APIs cannot be analysed using some of these existing systems. For example, the IBM 4758 [3] has one internal master key that is used to encrypt all other keys which are then stored on the attached host, therefore rule sets in which the result of a decryption cannot be used as a key (e.g., [17]) are unable to analyse the security API for that device.…”
Section: Discussionmentioning
confidence: 99%
“…The proof is based on a new notion of fast simulation, which builds on the work of Baier, Katoen, Hermanns, and Wolf [BKHW05] on strong and weak simulation on discrete and continuous Markov chains. The theorem that stripping is a fast simulation shows that the theory of probabilistic simulation can be applied fruitfully to the secure information flow problem, giving another proof technique in addition to the more common bisimulation-based approach of work like [LV05], [SA06], and [FR08] on languages with cryptography, and [AFG98], [SV98], [Smi03], [ACF06], [FC08] on multi-threaded languages. The recent work [AS09] on secure information flow in a distributed language also makes use of the technique of stripping and fast simulation, although in a non-probabilistic context.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…Interestingly, greatest fixed point computations were suggested [23, equation 15] as an algorithmic tool to evaluate Laud's entailment relation. The main difference between [19,23] and our work is that [19,23] retain the inductive framework (and entailment relation, see Section 2) for modeling the adversarial knowledge, and resolve the encryption cycles issue using ad-hoc methods. Here we establish a close connection between greatest fixed points and cryptographic expressions at the semantic (computational soundness) level, and present a general approach (based on the use of co-induction) that can be generalized to a larger class of cryptographic expressions, e.g., the expressions with pseudo-random keys [13,12], secret sharing schemes [14], etc.…”
Section: Related Workmentioning
confidence: 99%