Abstract
Ada Gem #82 --- The strong type system in Ada makes it quite convenient to check at compile time that certain security properties are verified, for example that a tainted value is not used where a trusted one is expected, or that data is properly validated before being used in a sensitive context (think of SQL injection attacks). In this series of two Gems, we present short examples of how this might be done. The first Gem discusses how to handle tainted data.
Recommendations
Gem #37: bounded buffer package in GNAT hierarchy (part 2)
Ada Gem #37 --- Part 1 of this Gem briefly introduced bounded buffers, protected types, and the declaration of the generic package GNAT. Bounded_Buffers, exporting protected type Bounded_Buffer. In Part 2 of the Gem we examine the private part of ...
Gem #85: the distributed systems annex 2 -- distributed objects
Ada Gem #85 --- This is the second in a series of Gems introducing the facilities defined by the optional annex for Distributed Systems (Annex E) of the Ada Reference Manual. In the first installment, we showed how a simple client/server architecture ...
Gem #87: the distributed systems annex, part 3 -- mailboxes
Ada Gem #87 --- This is the third in a series of gems introducing the facilities defined by the optional annex for Distributed systems (Annex E) of the Ada Reference Manual. In the previous two installments, we introduced the Distributed Systems Annex (...
Comments