Secure information flow and CPS

被引:0
|
作者
Zdancewic, S [1 ]
Myers, AC [1 ]
机构
[1] Cornell Univ, Ithaca, NY 14853 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style as a means of proving that such languages enforce non-interference and as a first step towards understanding their compilation. We present a low-level, secure calculus with higher-order, imperative features. Our type system makes novel use of ordered linear continuations.
引用
下载
收藏
页码:46 / 61
页数:16
相关论文
共 50 条
  • [21] SCOTRES: Secure Routing for IoT and CPS
    Hatzivasilis, George
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 2129 - 2141
  • [22] Non-termination and secure information flow
    Smith, Geoffrey
    Alpizar, Rafael
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2011, 21 (06) : 1183 - 1205
  • [23] A new type system for secure information flow
    Smith, G
    14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 115 - 125
  • [24] Secure information flow for a concurrent language with scheduling
    Barthe, Gilles
    Nieto, Leonor
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 647 - 689
  • [25] A type system for computationally secure information flow
    Laud, P
    Vene, V
    FUNDAMENTALS OF COMPUTATIONAL THEORY, PROCEEDINGS, 2005, 3623 : 365 - 377
  • [26] Secure information flow by self-composition
    Barthe, G
    D'Argenio, PR
    Rezk, T
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 100 - 114
  • [27] Supporting Secure Information Flow: An Engineering Approach
    Bracher, Shane
    Krishnan, Padmanabhan
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2012, 8 (01) : 17 - 35
  • [28] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [29] A Method of Secure Information Flow Based on Data Flow Analysis
    Yao, Jianbo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 597 - 606
  • [30] Using Blockchain Technology to Ensure Trustful Information Flow Monitoring in CPS
    Gries, Stefan
    Meyer, Ole
    Wessling, Florian
    Hesenius, Marc
    Gruhn, Volker
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2018), 2018, : 35 - 38