Close menu

SURE

Sunderland Repository records the research produced by the University of Sunderland including practice-based research and theses.

Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract)

This is the latest version of this item.

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Item Type: Conference or Workshop Item (Paper)

Abstract

The specification of security protocols with high-level programming abstractions, suited for security analysis and verification, has been advocated by the formal methods for security research community. Based on these principles of application design, we developed a tutorial to introduce undergraduate students to the foundations of security programming. The main pedagogical goal of this tutorial is to teach, in a simple and effective way, how to build secure distributed applications using common cryptographic primitives abstracting from their low-level details. The tutorial is aimed at helping the students to grasp quickly the main security concepts and to apply them effectively to the coding of distributed programs implementing security properties like authentication and secrecy. As programming is one of the main skills required by the cybersecurity industry, we believe that this tutorial can contribute to the professional development of future graduates.

[img]
Preview
PDF
hea-ncltc2016.pdf - Accepted Version

Download (144kB) | Preview

More Information

Depositing User: Paolo Modesti

Identifiers

Item ID: 6703
URI: http://sure.sunderland.ac.uk/id/eprint/6703
Official URL: https://www.heacademy.ac.uk/event/national-confere...

Users with ORCIDS

Catalogue record

Date Deposited: 09 Dec 2016 16:29
Last Modified: 02 Jul 2019 09:11

Contributors

Author: Paolo Modesti

University Divisions

Faculty of Technology > School of Computer Science

Subjects

Computing > Cybersecurity
Computing > Network Computing
Computing > Programming

Actions (login required)

View Item View Item

Available Versions of this Item