Functional Programming and Security

نویسنده

  • Yusuf Moosa Motara
چکیده

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiobjective security game with fuzzy payoffs

A multiobjective security game problem with fuzzy payoffs is studied in this paper. The problem is formulated as a bilevel programming problem with fuzzy coefficients. Using the idea of nearest interval approximation of fuzzy numbers, the problem is transformed into a bilevel programming problem with interval coefficients. The Karush-Kuhn-Tucker conditions is applied then to reduce the problem ...

متن کامل

Security Constrained Unit Commitment in the Simultaneous Presence of Demand Response Sources and Electric Vehicles

Due to the ever-growing load, especially peak load, the increase in the capacity of plants is inevitable for the response to this growth. Peak load causes increases in customer costs and vast investments in generating and transmission parts. Therefore, restructuring in the electrical industry, competition in the electrical market and Demand Response Programs (DRPs) are of special importance in ...

متن کامل

Secure Programming using a Functional Paradigm

This paper investigates the advantages of the functional language paradigm and its use in secure programming. The intended audience is software professionals from either the computer security domain or the functional language domain who have not yet considered cross-domain synthesis of ideas. Secure programming describes those practices that software developers use to provide security features ...

متن کامل

An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems

Security services in a multi-user environment are often based on access control mechanisms. Static aspects of an access control policy can be formalised using abstract algebraic models. We integrate these static aspects into a dynamic framework considering requesting access to resources as a process aiming at the prevention of access control violations when a program is executed. We use another...

متن کامل

Optimum Farm Plan for Food Security among Smallholder Farmers in Imo State, Nigeria

The paper determined optimum farm plan for food security among smallholder farmers in Imo State, Nigeria. Data were collected with structured and validated questionnaire from 180 smallholder crops farmers in Imo State. Data were analyzed using descriptive statistics (mean, frequency distribution and percentages), budgetary analysis and linear programming model. Results show that the mean age of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1201.5728  شماره 

صفحات  -

تاریخ انتشار 2012