Search for dissertations about: "NonInterference"
Showing result 1 - 5 of 15 swedish dissertations containing the word NonInterference.
-
1. MAC, A Verified Information-Flow Control Library
Abstract : Information Flow Control (IFC) is a language-based security mechanism that tracks where data flows within a program and prevents leakage of sensitive data. IFC has been embedded in pure functional languages such as Haskell, in the form of a library, thus reducing the implementation and maintenance effort and fostering a secure-by-construction programming-model. READ MORE
-
2. Securing Software in the Presence of Third-Party Modules
Abstract : Modular programming is a key concept in software development where the program consists of code modules that are designed and implemented independently. This approach accelerates the development process and enhances scalability of the final product. READ MORE
-
3. Tracking Information Flows in Interactive and Object-Oriented Programs
Abstract : This thesis improves the current state of the art on information-flow control of interactive and object-oriented programs, respectively. Given a policy which specifies which information flows are permitted in a program, the objective here is to ensure that only flows satisfying the policy can occur. READ MORE
-
4. Foundations of Information-Flow Control and Effects
Abstract : In programming language research, information-flow control (IFC) is a technique for enforcing a variety of security aspects, such as confidentiality of data, on programs. This Licenciate thesis makes novel contributions to the theory and foundations of IFC in the following ways: Chapter A presents a new proof method for showing the usual desired property of noninterference; Chapter B shows how to securely extend the concurrent IFC language MAC with asynchronous exceptions; and, Chapter C presents a new and simpler language for IFC with effects based on an explicit separation of pure and effectful computations. READ MORE
-
5. Securing Interactive Systems
Abstract : This thesis provides means to achieve end-to-end information-flow security in interactive systems. The elusiveness of this problem stems from the fact that interaction patterns, primitives, synchronous communication and nondeterminism combine in ways where seemingly innocuous systems compromise security in unexpected ways under interaction. READ MORE