Completed
Solution: Allow Programmers to Attach Policies Directly to Data The language and runtime manage policies so the programmer does not need to
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing Software by Construction: From Research to Industry - Philly ETE 2016
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Our Lives Run on Software
- 3 Secondary Goals of Talk
- 4 Problem I'm Solving: Protecting Sensitive Data is Hard
- 5 Programmers Must Navigate "Policy Spaghetti"
- 6 Solution: Allow Programmers to Attach Policies Directly to Data The language and runtime manage policies so the programmer does not need to
- 7 Jeeves Language and Execution Model
- 8 Semantics of Output
- 9 The Pain of Production-Testing a Research Prototype
- 10 Lessons Learned
- 11 Jacqueline, a Policy-Agnostic Web Framework
- 12 Research is Slow
- 13 Barriers to Industry Adoption
- 14 Security is no Tindog
- 15 Unique Challenges for Security Startups • Security is expensive, • Concept is highly technical
- 16 Cybersecurity Factory
- 17 Summer 2015 Cohort
- 18 How Teams Spent the Summer
- 19 Fun Discovery: Del Monte Foods is Unexpectedly Hip
- 20 The Security "Prisoner's Dilemma"
- 21 We Need to Care More
- 22 Conclusion: Many Pieces to Securing Software