scispace - formally typeset
D

Dave King

Researcher at Pennsylvania State University

Publications -  9
Citations -  281

Dave King is an academic researcher from Pennsylvania State University. The author has contributed to research in topics: Security policy & Access control. The author has an hindex of 8, co-authored 9 publications receiving 278 citations.

Papers
More filters
Book ChapterDOI

Implicit Flows: Can't Live with `Em, Can't Live without `Em

TL;DR: Experimentally investigates the explicit and implicit flows identified by the standard algorithm for establishing noninterference, and concludes with some ideas to improve the false alarm rate, toward making stronger security analysis more practical.
Proceedings ArticleDOI

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

TL;DR: An approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement based upon the observation that security-sensitive operations performed by a server are characterized by idiomatic resource manipulations, called fingerprints.
Proceedings ArticleDOI

Trusted declassification: high-level policy for a security-typed language

TL;DR: In this article, the authors propose a trusted declassification in which special declassifier functions are specified as part of the global policy, so that all information flows implied by the policy can be reasoned about in absence of a particular program.
Proceedings ArticleDOI

An architecture for enforcing end-to-end access control over web applications

TL;DR: The architecture is designed using Xen virtual machine management, SELinux at the operating system layer, labeled IPsec for networking and the own label-enforcing web browser, called FlowwolF, which is tested and finds that it performs well, supporting data intermixing while still providing end-to-end security guarantees.
Proceedings ArticleDOI

Effective blame for information-flow violations

TL;DR: In this article, the authors present a general model for information-flow blame that can explain the source of such security errors in code, which is implemented by changing the information flow verification procedure to generate supplementary information to reveal otherwise hidden program dependencies.