Semantics and Program Analysis of Computationally Secure Information Flow
This paper presents a definition of secure information flow. It is not based on noninterference, but on computational indistinguishability of the secret inputs, when the public outputs are observed. This definition allows cryptographic primitives to be handled. This paper also presents a Denning-sty...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 91 |
---|---|
container_issue | |
container_start_page | 77 |
container_title | |
container_volume | |
creator | Laud, Peeter |
description | This paper presents a definition of secure information flow. It is not based on noninterference, but on computational indistinguishability of the secret inputs, when the public outputs are observed. This definition allows cryptographic primitives to be handled. This paper also presents a Denning-style information-flow analysis for programs that use encryption as a primitive operation. The proof of the correctness of the analysis is sketched. |
doi_str_mv | 10.1007/3-540-45309-1_6 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_785878</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>785878</sourcerecordid><originalsourceid>FETCH-LOGICAL-p221t-ce120eeb064e8a92617cf1860909f360d533cf86985b0583289fc107b23f6a833</originalsourceid><addsrcrecordid>eNotkE1LAzEQhuMXWGvPXgOeo0lmN5scS7FaKChUzyGbJmV1d7MkW6T_3rg6l4HnfRmGB6E7Rh8YpdUjkLKgpCiBKsK0OEMLVUnIbEJwjmZMMEYACnWBbqaAScHlJZpRoJyoqoBrtEjpk-YBXiqmZmizc53px8YmbPo9fovhEE2Hl71pT6lJOHi8Ct1wHM3YhAzbE945e4wOb3ofYjdhvG7D9y268qZNbvG_5-hj_fS-eiHb1-fNarklA-dsJNYxTp2rqSicNIoLVlmfH6WKKg-C7ksA66VQsqxpKYFL5S2jVc3BCyMB5uj-7-5gkjWtj6a3TdJDbDoTT7qSpcxe5oj8tVIO-oOLug7hK2lG9a9NDToL0pM6nW3CDyDxYZQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Semantics and Program Analysis of Computationally Secure Information Flow</title><source>Springer Books</source><creator>Laud, Peeter</creator><contributor>Sands, David</contributor><creatorcontrib>Laud, Peeter ; Sands, David</creatorcontrib><description>This paper presents a definition of secure information flow. It is not based on noninterference, but on computational indistinguishability of the secret inputs, when the public outputs are observed. This definition allows cryptographic primitives to be handled. This paper also presents a Denning-style information-flow analysis for programs that use encryption as a primitive operation. The proof of the correctness of the analysis is sketched.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540418628</identifier><identifier>ISBN: 9783540418627</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540453093</identifier><identifier>EISBN: 3540453091</identifier><identifier>DOI: 10.1007/3-540-45309-1_6</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Covert Channel ; Cryptographic Primitive ; Exact sciences and technology ; Information systems. Data bases ; Language theory and syntactical analysis ; Memory organisation. Data processing ; Public Output ; Secure Information ; Security Parameter ; Software ; Theoretical computing</subject><ispartof>Lecture notes in computer science, 2001, p.77-91</ispartof><rights>Springer-Verlag Berlin Heidelberg 2001</rights><rights>2001 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45309-1_6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45309-1_6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=785878$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Sands, David</contributor><creatorcontrib>Laud, Peeter</creatorcontrib><title>Semantics and Program Analysis of Computationally Secure Information Flow</title><title>Lecture notes in computer science</title><description>This paper presents a definition of secure information flow. It is not based on noninterference, but on computational indistinguishability of the secret inputs, when the public outputs are observed. This definition allows cryptographic primitives to be handled. This paper also presents a Denning-style information-flow analysis for programs that use encryption as a primitive operation. The proof of the correctness of the analysis is sketched.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Covert Channel</subject><subject>Cryptographic Primitive</subject><subject>Exact sciences and technology</subject><subject>Information systems. Data bases</subject><subject>Language theory and syntactical analysis</subject><subject>Memory organisation. Data processing</subject><subject>Public Output</subject><subject>Secure Information</subject><subject>Security Parameter</subject><subject>Software</subject><subject>Theoretical computing</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540418628</isbn><isbn>9783540418627</isbn><isbn>9783540453093</isbn><isbn>3540453091</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkE1LAzEQhuMXWGvPXgOeo0lmN5scS7FaKChUzyGbJmV1d7MkW6T_3rg6l4HnfRmGB6E7Rh8YpdUjkLKgpCiBKsK0OEMLVUnIbEJwjmZMMEYACnWBbqaAScHlJZpRoJyoqoBrtEjpk-YBXiqmZmizc53px8YmbPo9fovhEE2Hl71pT6lJOHi8Ct1wHM3YhAzbE945e4wOb3ofYjdhvG7D9y268qZNbvG_5-hj_fS-eiHb1-fNarklA-dsJNYxTp2rqSicNIoLVlmfH6WKKg-C7ksA66VQsqxpKYFL5S2jVc3BCyMB5uj-7-5gkjWtj6a3TdJDbDoTT7qSpcxe5oj8tVIO-oOLug7hK2lG9a9NDToL0pM6nW3CDyDxYZQ</recordid><startdate>20010101</startdate><enddate>20010101</enddate><creator>Laud, Peeter</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>20010101</creationdate><title>Semantics and Program Analysis of Computationally Secure Information Flow</title><author>Laud, Peeter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p221t-ce120eeb064e8a92617cf1860909f360d533cf86985b0583289fc107b23f6a833</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Covert Channel</topic><topic>Cryptographic Primitive</topic><topic>Exact sciences and technology</topic><topic>Information systems. Data bases</topic><topic>Language theory and syntactical analysis</topic><topic>Memory organisation. Data processing</topic><topic>Public Output</topic><topic>Secure Information</topic><topic>Security Parameter</topic><topic>Software</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Laud, Peeter</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Laud, Peeter</au><au>Sands, David</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Semantics and Program Analysis of Computationally Secure Information Flow</atitle><btitle>Lecture notes in computer science</btitle><date>2001-01-01</date><risdate>2001</risdate><spage>77</spage><epage>91</epage><pages>77-91</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540418628</isbn><isbn>9783540418627</isbn><eisbn>9783540453093</eisbn><eisbn>3540453091</eisbn><abstract>This paper presents a definition of secure information flow. It is not based on noninterference, but on computational indistinguishability of the secret inputs, when the public outputs are observed. This definition allows cryptographic primitives to be handled. This paper also presents a Denning-style information-flow analysis for programs that use encryption as a primitive operation. The proof of the correctness of the analysis is sketched.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/3-540-45309-1_6</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2001, p.77-91 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_785878 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Covert Channel Cryptographic Primitive Exact sciences and technology Information systems. Data bases Language theory and syntactical analysis Memory organisation. Data processing Public Output Secure Information Security Parameter Software Theoretical computing |
title | Semantics and Program Analysis of Computationally Secure Information Flow |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T06%3A29%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Semantics%20and%20Program%20Analysis%20of%20Computationally%20Secure%20Information%20Flow&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Laud,%20Peeter&rft.date=2001-01-01&rft.spage=77&rft.epage=91&rft.pages=77-91&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540418628&rft.isbn_list=9783540418627&rft_id=info:doi/10.1007/3-540-45309-1_6&rft_dat=%3Cpascalfrancis_sprin%3E785878%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540453093&rft.eisbn_list=3540453091&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |