Mostrar el registro sencillo del ítem

dc.contributor.author
Barthe, Gilles  
dc.contributor.author
D'argenio, Pedro Ruben  
dc.contributor.author
Rezk, Tamara  
dc.date.available
2023-04-24T15:32:15Z  
dc.date.issued
2011-12  
dc.identifier.citation
Barthe, Gilles; D'argenio, Pedro Ruben; Rezk, Tamara; Secure information flow by self-composition; Cambridge University Press; Mathematical Structures In Computer Science; 21; 6; 12-2011; 1207-1252  
dc.identifier.issn
0960-1295  
dc.identifier.uri
http://hdl.handle.net/11336/195163  
dc.description.abstract
Information flow policies are confidentiality policies that control information leakage through program execution. A common way to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking or inference, their extensibility is very poor: type systems need to be redefined and proved sound for each new variation of security policy and programming language for which secure information flow verification is desired. In contrast, program logics offer a general mechanism for enforcing a variety of safety policies, and for this reason are favoured in Proof Carrying Code, which is a promising security architecture for mobile code. However, the encoding of information flow policies in program logics is not straightforward because they refer to a relation between two program executions. The purpose of this paper is to investigate logical formulations of secure information flow based on the idea of self-composition, which reduces the problem of secure information flow of a program P to a safety property for a program derived from P by composing P with a renaming of itself. Self-composition enables the use of standard techniques for information flow policy verification, such as program logics and model checking, that are suitable in Proof Carrying Code infrastructures. We illustrate the applicability of self-composition in several settings, including different security policies such as non-interference and controlled forms of declassification, and programming languages including an imperative language with parallel composition, a non-deterministic language and, finally, a language with shared mutable data structures.  
dc.format
application/pdf  
dc.language.iso
eng  
dc.publisher
Cambridge University Press  
dc.rights
info:eu-repo/semantics/openAccess  
dc.rights.uri
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/  
dc.subject
INFORMATION FLOW  
dc.subject
SELF-COMPOSITION  
dc.subject
LANGUAGE-BASED SECURITY  
dc.subject.classification
Ciencias de la Computación  
dc.subject.classification
Ciencias de la Computación e Información  
dc.subject.classification
CIENCIAS NATURALES Y EXACTAS  
dc.title
Secure information flow by self-composition  
dc.type
info:eu-repo/semantics/article  
dc.type
info:ar-repo/semantics/artículo  
dc.type
info:eu-repo/semantics/publishedVersion  
dc.date.updated
2023-04-24T15:07:58Z  
dc.journal.volume
21  
dc.journal.number
6  
dc.journal.pagination
1207-1252  
dc.journal.pais
Reino Unido  
dc.journal.ciudad
Cambridge  
dc.description.fil
Fil: Barthe, Gilles. No especifíca;  
dc.description.fil
Fil: D'argenio, Pedro Ruben. Universidad Nacional de Córdoba. Facultad de Matemática, Astronomía y Física. Sección Ciencias de la Computación; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba; Argentina  
dc.description.fil
Fil: Rezk, Tamara. No especifíca;  
dc.journal.title
Mathematical Structures In Computer Science  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/url/https://www.cambridge.org/core/journals/mathematical-structures-in-computer-science/article/abs/secure-information-flow-by-selfcomposition/E4DE2A8A9B914434160A4AAFA8A5FB7B  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/doi/http://dx.doi.org/10.1017/S0960129511000193