Analyzing Explicit Information Flow

  • Sriram K. Rajamani
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6503)


Constraining information flow is fundamental to security: we do not want secret information to reach untrusted principals (confidentiality), and we do not want untrusted principals to corrupt trusted information (integrity).


  1. 1.
    Chaudhuri, A., Naldurg, P., Rajamani, S.K., Ramalingam, G., Velaga, L.: Eon: modeling and analyzing dynamic access control systems with logic programs. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 381–390. ACM, New York (2008)CrossRefGoogle Scholar
  2. 2.
    Livshits, B., Nori, A.V., Rajamani, S.K., Banerjee, A.: Merlin: specification inference for explicit information flow problems. Programming Languages Design and Implementation, PLDI 2009, Also appears in SIGPLAN Notices 44(6), 75–86 (2009)Google Scholar
  3. 3.
    Naldurg, P., Schwoon, S., Rajamani, S.K., Lambert, J.: Netra: seeing through access control. In: Proceedings of the Fourth ACM Workshop on Formal Methods in Security, FMSE 2006, pp. 55–66. ACM, New York (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Sriram K. Rajamani
    • 1
  1. 1.Microsoft ResearchIndia

Personalised recommendations