A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Flow-Limited Authorization
2015
2015 IEEE 28th Computer Security Foundations Symposium
Enforcing the confidentiality and integrity of information is critical in distributed applications. Production systems typically use some form of authorization mechanism to protect information, but these mechanisms do not typically provide end-to-end information security guarantees. Information flow control mechanisms provide end-to-end security, but their guarantees break down when trust relationships may change dynamically, a common scenario in production environments. This dissertation
doi:10.1109/csf.2015.42
dblp:conf/csfw/ArdenLM15
fatcat:sxrbaf5vyffyfdhafjvqnqmyry