Sökning: "secure information flow"
Visar resultat 16 - 20 av 32 avhandlingar innehållade orden secure information flow.
16. Flow Java: Declarative Concurrency for Java
Sammanfattning : This thesis presents the design, implementation, and evaluation of Flow Java, a programming language for the implementation of concurrent programs. Flow Java adds powerful programming abstractions for automatic synchronization of concurrent programs to Java. LÄS MER
17. Towards a Trustworthy Stack: Formal Verification of Low-Level Hardware and Software
Sammanfattning : Computer systems, consisting of hardware and software, have gained significant importance in the digitalised world. These computer systems rely on critical components to provide core functionalities and handle sensitive data. LÄS MER
18. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings
Sammanfattning : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. LÄS MER
19. On the Foundations of Practical Language-Based Security
Sammanfattning : Language-based information flow control (IFC) promises to provide programming languages and tools that make it easy for developers to write secure code. Traditionally, research in this field aims to build a variant on a programming language or system that lets developers write code that gives them strong guarantees beyond the potential memory- and type-safety guarantees of modern languages. LÄS MER
20. Toward Secure and Reliable Networked Control Systems
Sammanfattning : Security and reliability are essential properties in Networked Control Systems (NCS), which are increasingly relevant in several important applications such as he process industry and electric power networks. The trend towards using non-proprietary and pervasive communication and information technology (IT) systems, such as the Internet and wireless communications, may result in NCS being vulnerable to cyber attacks. LÄS MER