Search for dissertations about: "runtime enforcement"
Showing result 1 - 5 of 12 swedish dissertations containing the words runtime enforcement.
-
1. Information Erasure: An Information-Flow Approach to Semantics and Enforcement
Abstract : Many modern online services require sensitive data to complete their tasks. For this reason, guaranteeing security policies in such services is a major concern. The traditional (and well studied) aspects of security, namely confidentiality, integrity, and availability of data, capture many but not all desirable policies involving sensitive-data. READ MORE
-
2. Securing functional programs with floating-label information-flow control
Abstract : The work presented in this thesis focuses on information-flow control systems for functional programs, particularly on the LIO library in Haskell. The thesis considers threemain aspects in this area: timing covert channels, dynamic policies andenforcement mechanisms that improve precision of the analysis. READ MORE
-
3. Securing Interactive Systems
Abstract : This thesis provides means to achieve end-to-end information-flow security in interactive systems. The elusiveness of this problem stems from the fact that interaction patterns, primitives, synchronous communication and nondeterminism combine in ways where seemingly innocuous systems compromise security in unexpected ways under interaction. READ MORE
-
4. Inlined Reference Monitors : Certification,Concurrency and Tree Based Monitoring
Abstract : Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). READ MORE
-
5. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software
Abstract : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. READ MORE