Information Flow Control in Object-Oriented Programs

  • Ciarán Bryce
Part of the Workshops in Computing book series (WORKSHOPS COMP.)


This paper proposes an information flow control mechanism for parallel object based languages. The mechanism registers the information transmissions between program variables independently of any particular security policy. Also looked at is the range of policies that may be expressed in the security model framework, how the approach relates to traditional multi-level security and the problems related to runtime information flow control in programs.


Information Flow Method Call Security Variable Security Semantic Information Flow Control 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Saltzer J, Schroeder M. The Protection of Information in Computer Systems. IEEE Proc 1975; 63:pages 1278 - 1308.CrossRefGoogle Scholar
  2. [2]
    Lampson B. Protection. ACM OSR 1974; 8: 18 - 24.Google Scholar
  3. [3]
    Levy H. Capability-Based Computer Systems. Digital Press, Mass. 1984.Google Scholar
  4. [4]
    Denning DE. Secure Information Flow in Computer Systems. Phd Thesis, Purdue University, 1975.Google Scholar
  5. [5]
    Banâtre JP, Bryce C. Information Flow Control in a Parallel Language Framework. In: 6th IEEE Computer Security Foundations Workshop. Franconia, New Hampshire, 1993, pp 39 - 51.Google Scholar
  6. [6]
    Korsen T, McGregor JD. Understanding Object-Oriented: a unifying paradigm. CACM 1990; 33: 39 - 60.Google Scholar
  7. [7]
    Cohen E. Information Transmission in Computational Systems. In: 6th ACM Symposium on Operating System Principles. 1977, pp 133 - 139.Google Scholar
  8. [8]
    Plotkin A. An Operational Semantics of CSP. In: Björner D (ed) Formal Description of Programming Concepts - II. North Holland, 1983, pp 199 - 225.Google Scholar
  9. [9]
    Reitman R. Information Flow in Parallel Programs. an Axiomatic Approach. Phd Thesis, Cornell University, 1978.Google Scholar
  10. [10]
    Mizuno M, Oldehoeft A. Information Flow Control in a Distributed Object-Oriented System: Parts I & 2. Research Report TR-CS-88-09. Kansas State University, 1988.Google Scholar
  11. [11]
    Hoare CAR. Communicating Sequential Processes. CACM 1978; 21: 666 - 674.MATHCrossRefGoogle Scholar
  12. [12]
    Brewer D, Nash M. The Chinese Wall Security Policy. In: IEEE Symposium on Security and Privacy. 1989, pp 206 - 214.Google Scholar
  13. [13]
    Banâtre JP, Bryce C. A Security Proof System for Networks of Communicating Processes. INRIA Research Report 2042, France, 1993.Google Scholar
  14. [14]
    Andrews GR, Reitman RP. An Axiomatic Approach to Information Flow in Programs. ACM TOPLAS 1980; 2: 504 - 513.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Ciarán Bryce
    • 1
  1. 1.IRISA-RennesFrance

Personalised recommendations