Show simple item record

dc.contributor.authorChong, Stephen
dc.contributor.authorMyers, Andrew C.
dc.date.accessioned2008-04-09T12:56:52Z
dc.date.available2008-04-09T12:56:52Z
dc.date.issued2008-04-09T12:56:52Z
dc.identifier.urihttps://hdl.handle.net/1813/10504
dc.description.abstractDeclassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of completely removing the information from the system. This paper shows how to enforce erasure and declassification policies. A combination of a type system that controls information flow and a simple runtime mechanism to overwrite data ensures end-to-end enforcement of policies. We prove that well-typed programs satisfy the semantic security condition noninterference according to policy. We extend the Jif programming language with erasure and declassification enforcement mechanisms and use the resulting language in a large case study of a voting system.en_US
dc.language.isoen_USen_US
dc.titleEnd-to-End Enforcement of Erasure and Declassificationen_US
dc.typetechnical reporten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Statistics