Filters








105,944 Hits in 3.4 sec

Secure program partitioning

Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
2002 ACM Transactions on Computer Systems  
Secure program partitioning permits a computation to be described as a single program independent of its distributed implementation.  ...  Confidentiality and integrity policies can be expressed by annotating programs with security types that constrain information flow; these programs can then be partitioned automatically to run securely  ...  Jif and secure program partitioning are complementary to current initiatives for privacy protection on the Internet.  ... 
doi:10.1145/566340.566343 fatcat:fygckehegbcyzgoqchrykccw3i

Untrusted hosts and confidentiality: secure program partitioning

S. Zdancewic, L. Zheng, N. Nystrom, A.C. Myers
Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]  
Confidentiality and integrity policies can be expressed by annotating programs with security types that constrain information flow; these programs can then be partitioned automatically to run securely  ...  This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untrusted hosts.  ...  Secure program partitioning permits a computation to be described as a single program independent of its distributed implementation.  ... 
doi:10.1109/fits.2003.1264931 fatcat:ttblwglf5rb5reho2pd45v3lnq

Polytope: Practical Memory Access Control for C++ Applications [article]

Ioannis Agadakos, Manuel Egele, William Robertson
2022 arXiv   pre-print
Polytope defines a policy language encoded as C++11 attributes that separate code and data into distinct program partitions.  ...  Designing and implementing secure software is inarguably more important than ever.  ...  represent security boundaries for program data.  ... 
arXiv:2201.08461v2 fatcat:4wzomo7fbbf7ba4vlxtlcwutoa

The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

Dhuratë Hyseni, Nimete Piraj, Betim Çiço, Isak Shabani
2022 Computers  
This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming  ...  Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud.  ...  Utilization of Reactive Programming in the Proposed Model for Cloud Security In the proposed model for cloud security proposed in [1, 12] , reactive programming was used in the partition distribution  ... 
doi:10.3390/computers11050062 fatcat:zr34he5awfg5lmewb2e2oqo6oi

Privacy Preserving Linear Programming [article]

Yuan Hong, Jaideep Vaidya, Nicholas Rizzo, Qi Liu
2016 arXiv   pre-print
Finally, we extend the technique for securely solving two-party arbitrarily partitioned linear programming problems to a multi-party scenario.  ...  programming problem.  ...  In addition, Mangasarian [44, 43] presented two transformation approaches for horizontally partitioned linear programs and vertically partitioned linear programs, respectively. Li et al.  ... 
arXiv:1610.02339v1 fatcat:spgrdyeeyreyxh5ik6o5bkaafa

Vulnerability analysis of secure USB flash drives

Hanjae Jeong, Younsung Choi, Woongryel Jeon, Fei Yang, Yunho Lee, Seungjoo Kim, Dongho Won
2007 Memory Technology, Design, and Testing  
USB flash drive without any security function causes the exposure of private information. So new USB flash drive supported security function was invented to compensate for the problem.  ...  In this paper, we analyze vulnerability of 6 famous secure USB flash drives, and demonstrate that password can be exposed on communication between the secure USB flash drive and PC.  ...  Partition Function The partition function separates the secure space from public space in the secure USB flash drive.  ... 
doi:10.1109/mtdt.2007.4547620 fatcat:55ja5vwj45huthebc7w2257zci

On the Role of Formal Methods in Software Certification: An Experience Report

Constance L. Heitmeyer
2009 Electronical Notes in Theoretical Computer Science  
The evidence included a top level specification (TLS) of the security-relevant software behavior, a formal statement of the required security properties, proofs that the specification satisfied the properties  ...  This paper describes how formal methods were used to produce evidence in a certification, based on the Common Criteria, of a security-critical software system.  ...  A more realistic goal may be a proof assistant with two inputs, a C program annotated with assertions and a TLS of the security-relevant functions of that program.  ... 
doi:10.1016/j.entcs.2009.09.001 fatcat:kq62li7v2jfjrf434tcmazrdrm

Security oriented program transformations (or how to add security on demand)

Munawar Hafiz
2008 Companion to the 23rd ACM SIGPLAN conference on Object oriented programming systems languages and applications - OOPSLA Companion '08  
Security requirements change. Many systems fail to cope with the changing requirements because it is hard to redesign. I show that security can be added by applying program transformations.  ...  This improves traditional security engineering approaches and keeps software secure in the face of new security threats.  ...  Partitioning has been automated many times; I have reviewed the partitioning tools.  ... 
doi:10.1145/1449814.1449912 dblp:conf/oopsla/Hafiz08 fatcat:3cckktbdnzf5vkym7dnkzs6orm

Privacy-preserving horizontally partitioned linear programs

Olvi L. Mangasarian
2010 Optimization Letters  
The solution vector of the transformed secure linear program is publicly generated and is available to all entities.  ...  We propose a simple privacy-preserving reformulation of a linear program whose equality constraint matrix is partitioned into groups of rows.  ...  Conclusion and Outlook We have shown how to securely solve a linear program when its equality constraint matrix and its right hand side data are partitioned among entities unwilling to share their data  ... 
doi:10.1007/s11590-010-0268-9 fatcat:3yobhse7wbee7olzzg7u6tepcy

RoleCast

Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov
2011 Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications - OOPSLA '11  
all programs.  ...  Our algorithm partitions the set of file contexts (a coarsening of calling contexts) on which securitysensitive events are control dependent into roles.  ...  Acknowledgments The research described in this paper was partially supported by the NSF grants CNS-0746888, CNS-0905602, and SHF-0910818, a Google research award, and the MURI program under AFOSR Grant  ... 
doi:10.1145/2048066.2048146 dblp:conf/oopsla/SonMS11 fatcat:w2gwct5ryng77gborszbqptkva

RoleCast

Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov
2011 SIGPLAN notices  
all programs.  ...  Our algorithm partitions the set of file contexts (a coarsening of calling contexts) on which securitysensitive events are control dependent into roles.  ...  Acknowledgments The research described in this paper was partially supported by the NSF grants CNS-0746888, CNS-0905602, and SHF-0910818, a Google research award, and the MURI program under AFOSR Grant  ... 
doi:10.1145/2076021.2048146 fatcat:sho2vfdbujbhdabtb5shr6h5sq

Analysis of three multilevel security architectures

Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen
2007 Proceedings of the 2007 ACM workshop on Computer security architecture - CSAW '07  
We introduce the Least Privilege architecture, which incorporates security features from the recent "Separation Kernel Protection Profile," and show how it can provide several unique aspects of security  ...  Various system architectures have been proposed for high assurance enforcement of multilevel security.  ...  objects by U subjects; but allow read-down/write-up from (e.g., an integrity filter program in) a SECRET partition.  ... 
doi:10.1145/1314466.1314473 dblp:conf/ccs/LevinIWN07 fatcat:pvyu3olitnc5bp7rfstjauujwq

Untrusted hosts and confidentiality

Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
2001 ACM SIGOPS Operating Systems Review  
Confidentiality and integrity policies can be expressed by annotating programs with security types that constrain information flow; these programs can then be partitioned automatically to run securely  ...  This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untrusted hosts.  ...  Secure program partitioning permits a computation to be described as a single program independent of its distributed implementation.  ... 
doi:10.1145/502059.502036 fatcat:74p3lzti6nfudosfanjxqz4dsi

The MILS component integration approach to secure information sharing

Carolyn Boettcher, Rance DeLong, John Rushby, Wilmar Sifre
2008 2008 IEEE/AIAA 27th Digital Avionics Systems Conference  
As part of the Air Force's Multiple Independent Levels of Security/Safety initiative, AFRL's multi-year High Assurance Middleware for Embedded Systems (HAMES) program is conducting research in integrating  ...  a complete secure system.  ...  Our vision for component-based assurance and evaluation is that commercial MILS components will be delivered with security evaluations corresponding to items 1 and 3 in the list above.  ... 
doi:10.1109/dasc.2008.4702758 fatcat:o4nwxwcdzvh2xhvlqaikwo4d5e

Patterns for the secure and reliable execution of processes

Eduardo B. Fernandez, David laRed Martinez
2008 Proceedings of the 15th Conference on Pattern Languages of Programs - PLoP '08  
Finally, the Multilevel Secure Partitions (MSP) pattern, confines execution of a process to a system partition that has a specific confidentiality or integrity level.  ...  The controlled interaction of processes in a computing environment is fundamental for its security and reliability.  ...  A trusted program is needed to override the rules and move subjects or data to other partitions [Gol06] .  ... 
doi:10.1145/1753196.1753225 fatcat:conz6yv7qnb23j5wlpaxpuoo5a
« Previous Showing results 1 — 15 out of 105,944 results