Implementing a type system for secure information-flow. Potential security risks

Implementing a type system for secure information-flow. Potential security risks
Author: Dominik Kropp
Publisher: GRIN Verlag
Total Pages: 90
Release: 2020-12-14
Genre: Computers
ISBN: 3346313565


Download Implementing a type system for secure information-flow. Potential security risks Book in PDF, Epub and Kindle

Master's Thesis from the year 2019 in the subject Computer Science - Software, grade: 77, City University London, course: Software Engineering, language: English, abstract: The objectives of this project are to design, implement and systematically demonstrate a chosen type system considering reliability, performance, and scalability. Furthermore, it aims to determine the limitations of the implementation and alternative architectural designs, to evaluate the extent to which the developed prototype scales up to real-life scenarios and to investigate the feasibility of a similar security type system for SAP systems. Standard security practices, such as access controls, insufficiently assure secure end-to-end behaviour of an application. Any program flaw, no matter how small or big, poses a potential security risk. Static information flow analysis checks a program for confidential information leaks into public data containers at compile-time. This design-and-build project’s aim is the prototypical implementation of a security type system for a simple demonstrative language to prevent programs leaking confidential information effectively. The project is based on existing research concerning security type systems as a means of enforcing information flow policies in a program. The results are discussed not only in terms of validity but also considering the feasibility of a similar security type system for SAP enterprise resource management systems. Society relies heavily on software-intensive systems in all facets of life. Information is automatically processed in automobiles, phones, fridges, and countless web servers. Much of that information is personal data and can distinguish an individual’s identity, such as their name, biometric records, or email addresses. Intellectual property and confidential information are handled in mission-critical military, governmental, medical and business applications. Therefore, building trust in the handling of data by systems is a crucial aspect of software architecture design.


Implementing a type system for secure information-flow. Potential security risks
Language: en
Pages: 90
Authors: Dominik Kropp
Categories: Computers
Type: BOOK - Published: 2020-12-14 - Publisher: GRIN Verlag

GET EBOOK

Master's Thesis from the year 2019 in the subject Computer Science - Software, grade: 77, City University London, course: Software Engineering, language: Englis
Computers at Risk
Language: en
Pages: 320
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1990-02-01 - Publisher: National Academies Press

GET EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided
Programming Languages for Information Security
Language: en
Pages: 626
Authors: Stephan Arthur Zdancewic
Categories:
Type: BOOK - Published: 2002 - Publisher:

GET EBOOK

Principles of Security and Trust
Language: en
Pages: 249
Authors: Flemming Nielson
Categories: Computers
Type: BOOK - Published: 2019-04-03 - Publisher: Springer

GET EBOOK

This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague
DevSecOps Transformation Control Framework
Language: en
Pages: 109
Authors: Michael Bergman
Categories: Computers
Type: BOOK - Published: 2024-08-22 - Publisher: Michael Bergman

GET EBOOK

This quick read book defines the DevSecOps Transformation Control Framework. Providing security control checklists for every phase of DevSecOps. Detailing a mul