Building Secure Systems using Programming Languages and Analysis

JIF questions

  1. What is the key difference between IFC and discretionary access control or capabilities?

  2. What are the benefits of enforcing IFC statically? (Why doesn’t JIF take the dynamic route?)