b0VIM 5.0c 33andrutonic.lcs.mit.edu~andru/infosec/html/paper.html3210#"! UtpUadd UUNGX,5/tc:65GU }xs22_-y x0Lo']tldjAndrew C. Myers, Barbara Liskov

``permissions@acm.org''permissions from Publications Dept, ACM Inc., fax +1 (212) 869-0481, orlists, requires prior specific permission and/or a fee. Requestotherwise, to republish, to post on servers, or to redistribute tomust be honored. Abstracting with credit is permitted. To copypage. Copyrights for components of this work owned by others than ACMand that new copies bear this notice and the full citation on the firstcopies are not made or distributed for profit or commercial advantagework for personal or classroom use is granted without fee provided thatInc. Permission to make digital or hard copies of part or all of thisCopyright ©1997 by the Association for Computing Machinery,

F30602-96-C-0303, monitored by USAF Rome Laboratory.monitored by the Office of Naval Research, and in part by DARPA ContractThis research was supported in part by DARPA Contract N00014-91-J-4136,

Saint-Malo, France, 5-8 October 1997.

To appear in the Proceedings of the 16th ACM Symposium on Operating Systems Principles,


  • References
  • 9 Future Work
  • 8 Conclusions
  • 7 Related Work
  • 6 Verification and Label Inference
  • 5 Application to a Language
  • 4 Checking Labels
  • 3 Decentralized Information Flow Control
  • 2 Motivating Examples
  • 1 Introduction