MARC보기
LDR00000nam u2200205 4500
001000000433717
00520200225153131
008200131s2019 ||||||||||||||||| ||eng d
020 ▼a 9781088379950
035 ▼a (MiAaPQ)AAI22615741
040 ▼a MiAaPQ ▼c MiAaPQ ▼d 247004
0820 ▼a 004
1001 ▼a Hirsch, Andrew Karl.
24510 ▼a Semantics for Secure Software.
260 ▼a [S.l.]: ▼b Cornell University., ▼c 2019.
260 1 ▼a Ann Arbor: ▼b ProQuest Dissertations & Theses, ▼c 2019.
300 ▼a 231 p.
500 ▼a Source: Dissertations Abstracts International, Volume: 81-04, Section: B.
500 ▼a Includes supplementary digital materials.
500 ▼a Advisor: Tate, Ross E.
5021 ▼a Thesis (Ph.D.)--Cornell University, 2019.
506 ▼a This item must not be sold to any third party vendors.
520 ▼a In order to build machine-checked proven-secure software, we need formal security policies that express what it means to be "secure." We must then show that the semantics of our software matches the semantics of those policies. This requires formal semantics for both programs and policies. In this dissertation, we explore the semantics of effectful programs and the semantics of authorization policies.The most well-known class of effects are those that can be given semantics via a monad, though current research also focuses on those that can be given a semantics via a comonad. We compare three methods for combining these two popular options: one method requires extra semantic structure, whereas the other methods can be applied to any monadic and comonadic effects. If the extra semantic structure needed for the first method exists then the three semantics are equivalent. Otherwise, we show that the two remaining semantics correspond to strict and lazy interpretations of the effects.On the other side, we use authorization logics to express authorization policies. Authorization logics can be given semantics using either models or a proof system. We build a model theory for an authorization logic that more-closely expresses how authorization logics are used by systems than traditional models. We also build a proof system for an authorization logic that ensures that proofs of authorization respect information-security policies.
590 ▼a School code: 0058.
650 4 ▼a Computer science.
690 ▼a 0984
71020 ▼a Cornell University. ▼b Computer Science.
7730 ▼t Dissertations Abstracts International ▼g 81-04B.
773 ▼t Dissertation Abstract International
790 ▼a 0058
791 ▼a Ph.D.
792 ▼a 2019
793 ▼a English
85640 ▼u http://www.riss.kr/pdu/ddodLink.do?id=T15493327 ▼n KERIS ▼z 이 자료의 원문은 한국교육학술정보원에서 제공합니다.
980 ▼a 202002 ▼f 2020
990 ▼a ***1008102
991 ▼a E-BOOK