Fred B. Schneider
"Security from Tags"
Reference monitors generally restrict operation invocation. We discuss an alternative approach to security: enforcing restrictions that tags give about how a value may be used. A new class of expressive tags is required. These RIF tags will be explained, with an eye towards static and run-time enforcement. We also discuss applications to privacy enforcement.