Precision, recall, and sensitivity of monitoring partially synchronous distributed programs

2021 ◽  
Vol 34 (5) ◽  
pp. 319-348
Author(s):  
Duong Nguyen ◽  
Sorrachai Yingchareonthawornchai ◽  
Vidhya Tekken Valapil ◽  
Sandeep S. Kulkarni ◽  
Murat Demirbas
Keyword(s):  
2011 ◽  
Author(s):  
William R. Marczak ◽  
Peter Alvaro ◽  
Neil Conway ◽  
Joseph M. Hellerstein ◽  
David Maier

1989 ◽  
Vol 32 (9) ◽  
pp. 1079-1084 ◽  
Author(s):  
Wan-Hong S. Cheng ◽  
Virgil E. Wallentine

2011 ◽  
Vol 21 (6) ◽  
pp. 1111-1181
Author(s):  
ANA ALMEIDA MATOS ◽  
JAN CEDERQUIST

With the emergence of the new possibilities offered by global computing, new security issues follow from the fact that these possibilities can be equally exploited by parties with malicious intentions. Many attacks arise at the application level, and can be tackled by means of programming language techniques. For instance, confidentiality can be violated during the execution of programs that reveal secret information. This kind of program behaviour can be avoided by information flow analyses that detect the encoding of illegal flows.This paper studies information flows that occur in distributed programs with code mobility from a language-based security perspective. New forms of security leaks that are introduced by code mobility, which we callmigration leaks, are presented and compared with well-known forms of illegal flow. We propose an information flow property that is adequate for networks consisting of a generalisation of the non-disclosure policy. We design a type and effect system for enforcing it on an expressive distributed calculus, and explain a soundness proof methodology in detail.


Sign in / Sign up

Export Citation Format

Share Document