Building Secure Systems with LIO (Demo)
Abstract
References
Index Terms
- Building Secure Systems with LIO (Demo)
Recommendations
Building secure systems with LIO (demo)
Haskell '14LIO is a decentralized information flow control (DIFC) system, implemented in Haskell. In this demo proposal, we give an overview of the LIO library and show how LIO can be used to build secure systems. In particular, we show how to specify high-level ...
Building secure systems with LIO (demo)
Haskell '14: Proceedings of the 2014 ACM SIGPLAN symposium on HaskellLIO is a decentralized information flow control (DIFC) system, implemented in Haskell. In this demo proposal, we give an overview of the LIO library and show how LIO can be used to build secure systems. In particular, we show how to specify high-level ...
Dynamic Enforcement of Dynamic Policies
PLAS'15: Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for SecurityThis paper presents SLIO, an information-flow control mechanism enforcing dynamic policies: security policies which change the relation between security levels while the system is running. SLIO builds on LIO, a floating-label information-flow control ...
Comments
Information & Contributors
Information
Published In
In-Cooperation
- Uppsala University, Department of Information Science: Uppsala University, Department of Information Science
- SIGPLAN: ACM Special Interest Group on Programming Languages
- SIGSOFT: ACM Special Interest Group on Software Engineering
- AITO: Assoc Internationale por les Technologies Objects
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 57Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in