Sökning: "NonInterference"
Visar resultat 1 - 5 av 15 avhandlingar innehållade ordet NonInterference.
1. MAC, A Verified Information-Flow Control Library
Sammanfattning : Information Flow Control (IFC) is a language-based security mechanism that tracks where data flows within a program and prevents leakage of sensitive data. IFC has been embedded in pure functional languages such as Haskell, in the form of a library, thus reducing the implementation and maintenance effort and fostering a secure-by-construction programming-model. LÄS MER
2. Securing Software in the Presence of Third-Party Modules
Sammanfattning : Modular programming is a key concept in software development where the program consists of code modules that are designed and implemented independently. This approach accelerates the development process and enhances scalability of the final product. LÄS MER
3. Tracking Information Flows in Interactive and Object-Oriented Programs
Sammanfattning : This thesis improves the current state of the art on information-flow control of interactive and object-oriented programs, respectively. Given a policy which specifies which information flows are permitted in a program, the objective here is to ensure that only flows satisfying the policy can occur. LÄS MER
4. Foundations of Information-Flow Control and Effects
Sammanfattning : In programming language research, information-flow control (IFC) is a technique for enforcing a variety of security aspects, such as confidentiality of data, on programs. This Licenciate thesis makes novel contributions to the theory and foundations of IFC in the following ways: Chapter A presents a new proof method for showing the usual desired property of noninterference; Chapter B shows how to securely extend the concurrent IFC language MAC with asynchronous exceptions; and, Chapter C presents a new and simpler language for IFC with effects based on an explicit separation of pure and effectful computations. LÄS MER
5. Securing Interactive Systems
Sammanfattning : This thesis provides means to achieve end-to-end information-flow security in interactive systems. The elusiveness of this problem stems from the fact that interaction patterns, primitives, synchronous communication and nondeterminism combine in ways where seemingly innocuous systems compromise security in unexpected ways under interaction. LÄS MER