Building Secure Systems in Haskell

Building Secure Systems in Haskell

Strange Loop Conference via YouTube Direct link

How do we enforce labels?

11 of 24

11 of 24

How do we enforce labels?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Building Secure Systems in Haskell

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Facebook missed a single security check...
  3. 3 Putting user privacy at risk: a recipe
  4. 4 A blogging web app example
  5. 5 Change how we build software
  6. 6 Yes! At least for web apps...
  7. 7 Hails: secure Haskell web framework
  8. 8 Extend MVC with security policy
  9. 9 How do we specify policy? • Policy specified as function from row to label Label concisely encodes read/write restriction on data
  10. 10 Where to enforce label restrictions?
  11. 11 How do we enforce labels?
  12. 12 Two kinds of code: MPs and VCs
  13. 13 extensibility
  14. 14 Is the TCB actually smaller?
  15. 15 Implementation details
  16. 16 Why Haskell?
  17. 17 Thinking about secure sub-language
  18. 18 Review: the 10 monad
  19. 19 How can we do anything useful?
  20. 20 Tracking reads & restricting writes
  21. 21 The LIO secure sub-language
  22. 22 What do we get with this?
  23. 23 What's the catch?
  24. 24 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.