Theoretical Computer Science
A Control-Flow Analysis for a Calculus of Concurrent Objects
IEEE Transactions on Software Engineering
ACM Transactions on Information and System Security (TISSEC)
The Definition of Standard ML
Information flow vs. resource access in the asynchronous pi-calculus
ACM Transactions on Programming Languages and Systems (TOPLAS)
Imperative objects as mobile processes
Science of Computer Programming
ECOOP '94 Proceedings of the 8th European Conference on Object-Oriented Programming
TAPSOFT '95 Proceedings of the 6th International Joint Conference CAAP/FASE on Theory and Practice of Software Development
CONCUR '99 Proceedings of the 10th International Conference on Concurrency Theory
A Calculus for Concurrent Objects
CONCUR '96 Proceedings of the 7th International Conference on Concurrency Theory
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS
Access control for mobile agents: The calculus of boxed ambients
ACM Transactions on Programming Languages and Systems (TOPLAS)
Enforcing Robust Declassification
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
A Distributed Calculus for Rôle-Based Access Control
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
A systematic approach to static access control
ACM Transactions on Programming Languages and Systems (TOPLAS)
Secrecy despite compromise: types, cryptography, and the pi-calculus
CONCUR 2005 - Concurrency Theory
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Certified In-lined Reference Monitoring on .NET
Proceedings of the 2006 workshop on Programming languages and analysis for security
Secrecy by Typing and File-Access Control
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Information and Computation
FOSSACS'03/ETAPS'03 Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software
Resource access and mobility control with dynamic privileges acquisition
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
A type system for data-flow integrity on windows vista
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
A type system for data-flow integrity on Windows Vista
ACM SIGPLAN Notices
Hi-index | 0.00 |
We develop a variant of Gordon and Hankin's concurrent object calculus with support for flexible access control on methods. We investigate safe administration and access of shared resources in the resulting language. Specifically, we show a static type system that guarantees safe manipulation of objects with respect to dynamic specifications, where such specifications are enforced via access changes on the underlying methods at runtime. By labeling types with secrecy groups, we show that well-typed systems preserve their secrets amidst dynamic access control and untrusted environments.