Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bart van Delft is active.

Publication


Featured researches published by Bart van Delft.


asian symposium on programming languages and systems | 2013

Paragon for Practical Programming with Information-Flow Control

Niklas Broberg; Bart van Delft; David Sands

Conventional security policies for software applications are adequate for managing concerns on the level of access control. But standard abstraction mechanisms of mainstream programming languages are not sufficient to express how information is allowed to flow between resources once access to them has been obtained. In practice we believe that such control - information flow control - is needed to manage the end-to-end security properties of applications. In this paper we present Paragon, a Java-based language with first-class support for static checking of information flow control policies. Paragon policies are specified in a logic-based policy language. By virtue of their explicitly stateful nature, these policies appear to be more expressive and flexible than those used in previous languages with information-flow support. Our contribution is to present the design and implementation of Paragon, which smoothly integrates the policy language with Javas object-oriented setting, and reaps the benefits of the marriage with a fully fledged programming language.


Journal of Computer Security | 2017

Paragon - Practical programming with information flow control

Niklas Broberg; Bart van Delft; David Sands

Conventional security policies for software applications are adequate for managing concerns on the level of access control. But standard abstraction mechanisms of mainstream programming languages are not sufficient to express how information is allowed to flow between resources once access to them has been obtained. In practice we believe that such control - information flow control - is needed to manage the end-to-end security properties of applications. In this paper we present Paragon, a Java-based language with first-class support for static checking of information flow control policies. Paragon policies are specified in a logic-based policy language. By virtue of their explicitly stateful nature, these policies appear to be more expressive and flexible than those used in previous languages with information-flow support. Our contribution is to present the design and implementation of Paragon, which smoothly integrates the policy language with Javas object-oriented setting, and reaps the benefits of the marriage with a fully fledged programming language.


ieee computer security foundations symposium | 2015

The Anatomy and Facets of Dynamic Policies

Niklas Broberg; Bart van Delft; David Sands

Information flow policies are often dynamic, the security concerns of a program will typically change during execution to reflect security-relevant events. A key challenge is how to best specify, and give proper meaning to, such dynamic policies. A large number of approaches exist that tackle that challenge, each yielding some important, but unconnected, insight. In this work we synthesise existing knowledge on dynamic policies, with an aim to establish a common terminology, best practices, and frameworks for reasoning about them. We introduce the concept of facets to illuminate subtleties in the semantics of policies, and closely examine the anatomy of policies and the expressiveness of policy specification mechanisms. We further explore the relation between dynamic policies and the concept of declassification.


international workshop on security | 2012

A Datalog Semantics for Paralocks

Bart van Delft; Niklas Broberg; David Sands

Broberg and Sands (POPL’10) introduced a logic-based policy language, Paralocks, suitable for static information-flow control in programs. Although Paralocks comes with a precise information-flow semantics for programs, the logic-based semantics of policies, describing how policies are combined and compared, is less well developed. This makes the algorithms for policy comparison and computation ad-hoc, and their security guarantees less intuitive. In this paper we provide a new semantics for Paralocks policies based on Datalog. By doing so we are able to show that the ad-hoc semantics from earlier work coincides with the natural Datalog interpretation. Furthermore we show that by having a Datalog-inspired semantics, we can borrow language extensions and algorithms from Datalog for the benefit of Paralocks. We explore how these extensions and algorithms interact with the design and implementation of Paragon, a language combining Paralocks with Java.


acm workshop on programming languages and analysis for security | 2015

Dynamic Enforcement of Dynamic Policies

Pablo Buiras; Bart van Delft

This paper presents SLIO, an information-flow control mechanism enforcing dynamic policies: security policies which change the relation between security levels while the system is running. SLIO builds on LIO, a floating-label information-flow control system embedded in Haskell that uses a runtime monitor to enforce security. We identify an implicit flow arising from the decision to change the policy based on sensitive information and introduce a corresponding check in the enforcement mechanism. We provide a formal security guarantee for SLIO, presented as a knowledge-based property, which specifies that observers can only learn information in accordance with the level ordering. Like LIO, SLIO is a generic enforcement mechanism, parametrised on the concrete instantiation of security labels and their policy change mechanism. To illustrate the applicability of our results, we implement well-known label models such as DLM, the Flowlocks framework, and DC labels in SLIO.


acm workshop on programming languages and analysis for security | 2014

Paragon: Programming with Information Flow Control (Demo)

Niklas Broberg; Bart van Delft; David Sands

We demonstrate Paragon, a Java-based programming language with integrated information-flow control. We show how the use of information-flow policies combined with encapsulation allows for simple yet powerful and flexible policy libraries tailored to the needs of a particular application or system.


principles of security and trust | 2015

Very Static Enforcement of Dynamic Policies

Bart van Delft; Sebastian Hunt; David Sands


Archive | 2016

Protecting Information under Dynamic Policies: Specification, Conditions and Enforcement

Bart van Delft


Software Systems Safety | 2014

Programming in Paragon.

Bart van Delft; Niklas Broberg; David Sands


Archive | 2014

A Policy Semantics and a Programming Language for Securing Software

Bart van Delft

Collaboration


Dive into the Bart van Delft's collaboration.

Top Co-Authors

Avatar

David Sands

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Niklas Broberg

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pablo Buiras

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge