Implementing a type system for secure information-flow. Potential security risks

Implementing a type system for secure information-flow. Potential security risks
Author :
Publisher : GRIN Verlag
Total Pages : 90
Release :
ISBN-10 : 9783346313560
ISBN-13 : 3346313565
Rating : 4/5 (565 Downloads)

Book Synopsis Implementing a type system for secure information-flow. Potential security risks by : Dominik Kropp

Download or read book Implementing a type system for secure information-flow. Potential security risks written by Dominik Kropp and published by GRIN Verlag. This book was released on 2020-12-14 with total page 90 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2019 in the subject Computer Science - Software, grade: 77, City University London, course: Software Engineering, language: English, abstract: The objectives of this project are to design, implement and systematically demonstrate a chosen type system considering reliability, performance, and scalability. Furthermore, it aims to determine the limitations of the implementation and alternative architectural designs, to evaluate the extent to which the developed prototype scales up to real-life scenarios and to investigate the feasibility of a similar security type system for SAP systems. Standard security practices, such as access controls, insufficiently assure secure end-to-end behaviour of an application. Any program flaw, no matter how small or big, poses a potential security risk. Static information flow analysis checks a program for confidential information leaks into public data containers at compile-time. This design-and-build project’s aim is the prototypical implementation of a security type system for a simple demonstrative language to prevent programs leaking confidential information effectively. The project is based on existing research concerning security type systems as a means of enforcing information flow policies in a program. The results are discussed not only in terms of validity but also considering the feasibility of a similar security type system for SAP enterprise resource management systems. Society relies heavily on software-intensive systems in all facets of life. Information is automatically processed in automobiles, phones, fridges, and countless web servers. Much of that information is personal data and can distinguish an individual’s identity, such as their name, biometric records, or email addresses. Intellectual property and confidential information are handled in mission-critical military, governmental, medical and business applications. Therefore, building trust in the handling of data by systems is a crucial aspect of software architecture design.


Implementing a type system for secure information-flow. Potential security risks Related Books

Implementing a type system for secure information-flow. Potential security risks
Language: en
Pages: 90
Authors: Dominik Kropp
Categories: Computers
Type: BOOK - Published: 2020-12-14 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Master's Thesis from the year 2019 in the subject Computer Science - Software, grade: 77, City University London, course: Software Engineering, language: Englis
Computers at Risk
Language: en
Pages: 320
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1990-02-01 - Publisher: National Academies Press

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided
Principles of Security and Trust
Language: en
Pages: 249
Authors: Flemming Nielson
Categories: Computers
Type: BOOK - Published: 2019-04-02 - Publisher: Springer

DOWNLOAD EBOOK

This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague
DevSecOps Transformation Control Framework
Language: en
Pages: 109
Authors: Michael Bergman
Categories: Computers
Type: BOOK - Published: 2024-08-22 - Publisher: Michael Bergman

DOWNLOAD EBOOK

This quick read book defines the DevSecOps Transformation Control Framework. Providing security control checklists for every phase of DevSecOps. Detailing a mul
Programming Languages for Information Security
Language: en
Pages: 626
Authors: Stephan Arthur Zdancewic
Categories:
Type: BOOK - Published: 2002 - Publisher:

DOWNLOAD EBOOK