2000
DOI: 10.1145/357766.351244
|View full text |Cite
|
Sign up to set email alerts
|

Static enforcement of security with types

Abstract: A number of security systems for programming languages have recently appeared, including systems for enforcing some form of access control . The Java JDK 1.2 security architecture is one such system that is widely studied and used. While the architecture has many appealing features, access control checks are all implemented via dynamic method calls. This is a highly non-declarative form of specification which is hard to read, and which leads to additional run-time overhead. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
39
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(39 citation statements)
references
References 11 publications
0
39
0
Order By: Relevance
“…A major topic of recent interest is secure information flow [Abadi et al 1999;Denning 1976;Smith and Volpano 1998;Volpano and Smith 1997], which associates high and low security levels with expressions and tries to prevent high-security data from "leaking" to low-security outputs. Other examples of security-related annotation systems are lambda calculus with trust annotations [Ørbaek and Palsberg 1997] and Java security checking [Skalka and Smith 2000]. These systems include checks for implicit flows from conditional guards to the body of the conditional.…”
Section: Flow-insensitive Type Qualifiersmentioning
confidence: 99%
“…A major topic of recent interest is secure information flow [Abadi et al 1999;Denning 1976;Smith and Volpano 1998;Volpano and Smith 1997], which associates high and low security levels with expressions and tries to prevent high-security data from "leaking" to low-security outputs. Other examples of security-related annotation systems are lambda calculus with trust annotations [Ørbaek and Palsberg 1997] and Java security checking [Skalka and Smith 2000]. These systems include checks for implicit flows from conditional guards to the body of the conditional.…”
Section: Flow-insensitive Type Qualifiersmentioning
confidence: 99%
“…Based on this insight, Skalka and Smith [2000] have developed a static type system of code-level access control for a variant of the lambda calculus by refining the type system of the lambda calculus with access privilege information. They have proved the soundness of the type system, which ensures that a well-typed program will not cause security violation.…”
Section: Introductionmentioning
confidence: 99%
“…Pottier et al [2005] further refined this type system. Banerjee and Naumann [2001] have defined a denotational semantics for a language similar to the calculus considered in Skalka and Smith [2000] and Pottier et al [2005], which provides additional assurance of the safety of this type-based approach. As a static verification system, this approach does not incur any runtime overhead, and detects all access violations at compile time.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations