TY - GEN
T1 - Secure information flow and pointer con .nement in a java-like language
AU - Banerjee, A.
AU - Naumann, D. A.
N1 - Publisher Copyright:
© 2002 IEEE.
PY - 2002
Y1 - 2002
N2 - We consider a sequential object-oriented language with pointers and mutable state, private fields and class-based visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrained by security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure information flow.
AB - We consider a sequential object-oriented language with pointers and mutable state, private fields and class-based visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrained by security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure information flow.
KW - Access control
KW - Calculus
KW - Computer science
KW - Computer security
KW - Data security
KW - Information security
KW - Java
KW - Object oriented modeling
KW - Parametric statistics
KW - Sequential analysis
UR - http://www.scopus.com/inward/record.url?scp=84948752619&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84948752619&partnerID=8YFLogxK
U2 - 10.1109/CSFW.2002.1021820
DO - 10.1109/CSFW.2002.1021820
M3 - Conference contribution
AN - SCOPUS:84948752619
T3 - Proceedings of the Computer Security Foundations Workshop
SP - 253
EP - 267
BT - Proceedings - 15th IEEE Computer Security Foundations Workshop, CSFW 2002
T2 - 15th IEEE Computer Security Foundations Workshop, CSFW 2002
Y2 - 24 June 2002 through 26 June 2002
ER -