Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs

Information flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slici...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2009
Language:English
Physical Description:1 electronic resource (221 p. p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545664704498
ctrlnum (CKB)4920000000101296
(oapen)https://directory.doabooks.org/handle/20.500.12854/50219
(EXLCZ)994920000000101296
collection bib_alma
record_format marc
spelling Hammer, Christian auth
Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
Information flow control for java
KIT Scientific Publishing 2009
1 electronic resource (221 p. p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Information flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slicing, which is closely connected to IFC and offers many dimensions for improving analysis precision, the most powerful are Path Conditions. Our evaluation shows scalability with a low annotation burden.
English
information flow control
software security
program slicing
program dependence graph
path conditions
3-86644-398-6
language English
format eBook
author Hammer, Christian
spellingShingle Hammer, Christian
Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
author_facet Hammer, Christian
author_variant c h ch
author_sort Hammer, Christian
title Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_full Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_fullStr Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_full_unstemmed Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_auth Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_alt Information flow control for java
title_new Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
title_sort information flow control for java : a comprehensive approach based on path conditions in dependence graphs
publisher KIT Scientific Publishing
publishDate 2009
physical 1 electronic resource (221 p. p.)
isbn 1000012049
3-86644-398-6
illustrated Not Illustrated
work_keys_str_mv AT hammerchristian informationflowcontrolforjavaacomprehensiveapproachbasedonpathconditionsindependencegraphs
AT hammerchristian informationflowcontrolforjava
status_str n
ids_txt_mv (CKB)4920000000101296
(oapen)https://directory.doabooks.org/handle/20.500.12854/50219
(EXLCZ)994920000000101296
carrierType_str_mv cr
is_hierarchy_title Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
_version_ 1796651960946917376
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01570nam-a2200337z--4500</leader><controlfield tag="001">993545664704498</controlfield><controlfield tag="005">20231214133332.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2009 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000012049</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000000101296</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/50219</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000000101296</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hammer, Christian</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Information flow control for java </subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">KIT Scientific Publishing</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (221 p. p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slicing, which is closely connected to IFC and offers many dimensions for improving analysis precision, the most powerful are Path Conditions. Our evaluation shows scalability with a low annotation burden.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information flow control</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">software security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">program slicing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">program dependence graph</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">path conditions</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-86644-398-6</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:50:39 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-11-10 04:18:40 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337991990004498&amp;Force_direct=true</subfield><subfield code="Z">5337991990004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337991990004498</subfield></datafield></record></collection>