1999
DOI: 10.1007/10705424_4
|View full text |Cite
|
Sign up to set email alerts
|

Partial Evaluation and Non-interference for Object Calculi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2003
2003
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…This language has also been implemented in the Jif compiler [44]. Barthe and Serpette [8] consider information flow in a simple object-oriented language based on the Abadi-Cardelli functional object calculi [79] and show that their type system enforces noninterference. Banerjee and Naumann [13] develop a security-type system for a Java-like imperative object-oriented language and show that it enforces noninterference.…”
Section: A Language Expressivenessmentioning
confidence: 99%
See 1 more Smart Citation
“…This language has also been implemented in the Jif compiler [44]. Barthe and Serpette [8] consider information flow in a simple object-oriented language based on the Abadi-Cardelli functional object calculi [79] and show that their type system enforces noninterference. Banerjee and Naumann [13] develop a security-type system for a Java-like imperative object-oriented language and show that it enforces noninterference.…”
Section: A Language Expressivenessmentioning
confidence: 99%
“…Viewing dynamic as high and static as low we obtain the connection to security. The connection with partial evaluation has been explored by Sabelfeld and Sands [17], [85], Barthe and Serpette [8], and Thiemann [100].…”
Section: Covert Channelsmentioning
confidence: 99%
“…The bulk of previous research [4][5][6][7][8][9][10][11] associates the notion of non-interference to a program and develops static analyses that accept a program only if all its executions ensure the confidentiality of secrets. In contrast, this paper presents a dynamic analysis that uses the results of a static analysis: the dynamic analysis accepts or rejects a single execution of a program without necessarily doing the same for all other executions.…”
Section: Introductionmentioning
confidence: 99%
“…There has been much recent progress on understanding information flow in languages of increasing complexity [SM03], and, consequently, information-flow security tools for languages such as Java, ML, and Ada have emerged [MZZ + 10], [Sim03], [Sys10]. In particular, information flow in object-oriented languages has been an area of intensive development [Mye99], [BS99], [BCG + 02], [ABF03], [BFLM05], [BN05], [ABB06], [Nau06], [BRN06], [HS09]. However, it is surprising that the impact of class initialization, being an important aspect of object-oriented programs, has received scarce attention in the context of security.…”
Section: Introductionmentioning
confidence: 99%