Encoding secure information flow with restricted delegation and revocation in Haskell.
Doaa HassanAmr SabryPublished in: FPCDSL@ICFP (2013)
Keyphrases
- information flow
- access control
- key management
- key distribution
- security requirements
- security mechanisms
- information security
- public key cryptography
- flow analysis
- information flows
- security issues
- blind signature
- security model
- functional programming
- communication networks
- flow graph
- access control policies
- social networks
- public key
- role based access control
- digital signature
- supply chain
- programming language
- encryption scheme
- information systems
- trusted third party
- information propagation
- security policies
- conflict resolution
- signature scheme
- standard model
- wireless sensor networks
- digital rights management
- security protocols