A Security Kernel Based on the Lambda-Calculus

Total Page:16

File Type:pdf, Size:1020Kb

A Security Kernel Based on the Lambda-Calculus MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY A.I. Memo No. 1564 March, 1996 A Security Kernel Based on the Lamb da-Calculus Jonathan A. Rees This publication can b e retrieved byanonymous ftp to publications.ai.mit.edu. Abstract Co op eration b etween indep endent agents dep ends up on establishing a degree of security.Eachofthe co op erating agents needs assurance that the co op eration will not endanger resources of value to that agent. In a computer system, a computational mechanism can assure safe co op eration among the system's users by mediating resource access according to desired security p olicy.Such a mechanism, which is called a security kernel , lies at the heart of many op erating systems and programming environments. This rep ort describ es Scheme 48, a programming environment whose design is guided by established prin- ciples of op erating system security.Scheme 48's securitykernel is small, consisting of the call-by-value -calculus with a few simple extensions to supp ort abstract data typ es, ob ject mutation, and access to hardware resources. Eachagent (user or subsystem) has a separate evaluation environment that holds ob- jects representing privileges granted to that agent. Because environments ultimately determine availability of ob ject references, protection and sharing can b e controlled largely by the wayinwhichenvironments are constructed. I will describ e exp erience with Scheme 48 that shows how it serves as a robust and exible exp erimental platform. Two successful applications of Scheme 48 are the programming environment for the Cornell mobile rob ots, where Scheme 48 runs with no (other) op erating system supp ort; and a secure multi-user environment that runs on workstations. c Copyright Massachusetts Institute of Technology, 1996 This rep ort describ es research done at the Arti cial Intelligence Lab oratory of the Massachusetts Institute of Technology. Supp ort for this researchwas provided in part by the Advanced Research Pro jects Agency of the Department of Defense under Oce of Naval Researchcontract N00014-92-J-4097. in which the -calculus and W7 provide protection is 1 Intro duction through closure : a pro cedure is not just a program but Co op eration b etween indep endent agents dep ends up on a program coupled with its environment of origin. A pro- establishing a degree of security. Each of the co op er- cedure cannot access the environment of its call, and its ating agents needs assurance that the co op eration will caller cannot access the pro cedure's environmentofori- not endanger resources of value to that agent. In a com- gin. The caller and callee are therefore protected from puter system, a computational mechanism can assure one another. Sharing is accomplished through shared safe co op eration among the system's users by mediat- p ortions of environments, whichmay include pro cedures ing resource access according to desired security p olicy. that allow still other ob jects to b e shared. Such a mechanism, whichiscalledasecurity kernel , lies To address a numberofauthentication and certi ca- at the heart of many op erating systems and program- tion problems, W7 includes an abstract data typ e facil- ming environments. ity. (Usually this term refers to typ e abstraction enforced I claim that the -calculus can serve as the central through compile-timetyp e checking, but here it means comp onent of a simple and exible securitykernel. The a dynamic information hiding mechanism.) The facil- present rep ort supp orts this thesis by motivating and de- ity is akin to digital signatures: a subsystem may sign scribing sucha-calculus-based securitykernel and by an ob ject in suchaway that the signed ob ject maybe giving several lines of evidence of the kernel's e ective- recognized as having b een de nitely signed by that sub- ness. system. In particular, a compiler might use a particular 1 The W7 securitykernel consists of the call-by-value signature to mean that the signed pro cedure is one that -calculus with a few simple extensions to supp ort ab- is \harmless" (in a technical sense) and is therefore safe stract data types,objectmutation, and access to hard- to apply to fragile arguments. ware resources. Within W7, each agent (user or subsys- tem) has a separate evaluation environment that holds 1.2 Scheme 48 ob jects representing privileges granted to that agent. Scheme 48 is a complete Scheme system that tests W7's Because environments ultimately determine availability capacity to supp ort safe co op eration. Scheme 48 was of ob ject references, protection and sharing can b e con- a ma jor design and implementation e ort and therefore trolled largely bytheway in whichenvironments are constitutes the heart of the pro ject. Section 3 gives an constructed. overview of Scheme 48, but most of the information on The e ectiveness of W7 as a securitykernel is demon- it is to b e found in the related rep orts [13,23,6,19]. strated through three lines of evidence: A large amount of engineering go es into making a 1. its ability to address certain fundamental security practical programming environment, and in Scheme 48 problems that are imp ortant for co op eration (Sec- security has b een a concern in nearly every comp onent. tions 2.2{2.3); Ma jor facilities whose design has b een shap ed by secu- 2. a structural corresp ondence with familiar op erating rity concerns include the following: system kernels (Section 2.4); and The mo dule system [19]. Mo dules are truly encap- 3. the success of Scheme 48, a complete implemen- sulated, just as pro cedures are, allowing them to tation of the Scheme programming language built b e shared safely. on W7, as a basis for secure, robust, and exible The macro facility [6]. Macros are also closed, like programming systems (Section 3). pro cedures. This allows a form of compile-time se- curityinwhich a mo dule may exp ort a macro while 1.1 Security Kernel Based on -calculus protecting ob jects used in the macro's implemen- The -calculus is a calculus of functions, and is con- tation. cerned with how computations are abstracted and in- stantiated and how names come to have meanings. W7 Dynamic variables. Information can b e communi- is a -calculus of procedures, which are generalized func- cated from caller to callee through an implicit dy- tions capable of p erforming side e ects. Pro cedures cor- namic environment. However, a dynamic variable resp ond to what in an op erating system would b e pro- must b e accessed via a key,andsuchkeys can b e grams and servers. Side e ects include access to input protected. and output devices and to memory cells. It is through A ma jor theme running through the design of Scheme side e ects that communication, and therefore co op era- 48 is avoidance or minimization of shared global state. tion, is p ossible. However, side e ects can b e harmful. For example, the virtual machine (byte-co de interpreter) For example, a computer-controlled rob ot arm can easily has only an essential minimum set of registers; there are hurt a p erson who gets in its way. no registers that hold global symb ol tables or environ- The purp ose of a securitykernel is to allowcontrol ment structure as there is in most Lisp and Scheme im- over access to ob jects. The challenge in designing a se- plementations. Another example is in the run-time sys- curitykernel is not to supp ort sharing or protection p er tem mo dules, which never alter global state (in Scheme se, but rather to allow exible control over the extent terms, no top-level variable is ever assigned with set!). to which an ob ject is shared or protected. One way Data structures manipulated by these mo dules can b e 1 instantiated multiple times to avoid con ict over their This name was chosen to have no mnemonic or cuteness value. use. 1 resources of value to that agent, so those resources are Finally, the success of Scheme 48 (and therefore of also put at risk when the program is invoked. W7) is demonstrated by its use in a numb er of applica- tions. These include the programming environmentfor Consider the following scenario: the Cornell mobile rob ots, where Scheme 48 runs with Bart writes a program that sorts a list of num- no (other) op erating system supp ort [23], and a secure b ers. Being a generous fellow, he gives this multi-user environment that runs on workstations. useful program to Lisa, who has expressed an interest in using such a program. But 2 The Security Kernel Lisa is hesitant to use Bart's program, since Bart mayhave arranged for the program to This section is an exp osition, starting from rst princi- do sneaky things. For example, the program ples, of the problem of secure co op eration b etween inde- mightcovertly send the list to b e sorted back p endent agents. It describ es a simple idealized security to Bart via electronic mail. That would b e kernel that addresses this problem. The presentation is unfortunate, since Lisa wants to sort a list intended to show the essential unity of security concerns of credit card numb ers, and she would liketo in op erating systems and programming languages. keep these secret. What should Bart and Lisa The idealized kernel is based on a graph of encapsu- do? lated ob jects. Accessibility of one ob ject from another is constrained by the connectivity of the ob ject graph and There are two distinct approaches to solving the safe further limited by ob ject-sp eci c gatekeep er programs.
Recommended publications
  • Scala Tutorial
    Scala Tutorial SCALA TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Scala Tutorial Scala is a modern multi-paradigm programming language designed to express common programming patterns in a concise, elegant, and type-safe way. Scala has been created by Martin Odersky and he released the first version in 2003. Scala smoothly integrates features of object-oriented and functional languages. This tutorial gives a great understanding on Scala. Audience This tutorial has been prepared for the beginners to help them understand programming Language Scala in simple and easy steps. After completing this tutorial, you will find yourself at a moderate level of expertise in using Scala from where you can take yourself to next levels. Prerequisites Scala Programming is based on Java, so if you are aware of Java syntax, then it's pretty easy to learn Scala. Further if you do not have expertise in Java but you know any other programming language like C, C++ or Python, then it will also help in grasping Scala concepts very quickly. Copyright & Disclaimer Notice All the content and graphics on this tutorial are the property of tutorialspoint.com. Any content from tutorialspoint.com or this tutorial may not be redistributed or reproduced in any way, shape, or form without the written permission of tutorialspoint.com. Failure to do so is a violation of copyright laws. This tutorial may contain inaccuracies or errors and tutorialspoint provides no guarantee regarding the accuracy of the site or its contents including this tutorial. If you discover that the tutorialspoint.com site or this tutorial content contains some errors, please contact us at [email protected] TUTORIALS POINT Simply Easy Learning Table of Content Scala Tutorial ..........................................................................
    [Show full text]
  • 1 Aliasing and Immutability
    Vocabulary: Accessors & Mutators Computer Science and Engineering The Ohio State University Accessor: A method that reads, but never changes, the Aliasing and Immutability (abstract) state of an object Computer Science and Engineering College of Engineering The Ohio State University Concrete representation may change, so long as change is not visible to client eg Lazy initialization Examples: getter methods, toString Lecture 8 Formally: restores “this” Mutator method: A method that may change the (abstract) state of an object Examples: setter methods Formally: updates “this” Constructors not considered mutators A Fixed Epoch Interface A Broken Time Period Class Computer Science and Engineering The Ohio State University Computer Science and Engineering The Ohio State University // Interface cover story goes here public class Period implements FixedEpoch { // Mathematical modeling … private Date start; // constructor private Date end; // requires start date < end date // initializes start and end dates // operations have specifications based on the model public Period(Date start, Date end) { // exercises … this.start = start; this.e nd = e nd; public interface FixedEpoch { } public Date getStart(); public Date getEnd(); } public Date getStart() { return start; } public Date getEnd() { return end; } } Problem: Aliasing A Better Period Class Computer Science and Engineering The Ohio State University Computer Science and Engineering The Ohio State University Assignment in constructor creates an alias public class Period
    [Show full text]
  • Functional Programming Inside OOP?
    Functional Programming inside OOP? It’s possible with Python >>>whoami() Carlos Villavicencio ● Ecuadorian θ ● Currently: Python & TypeScript ● Community leader ● Martial arts: 剣道、居合道 ● Nature photography enthusiast po5i Cayambe Volcano, 2021. >>>why_functional_programming ● Easier and efficient ● Divide and conquer ● Ease debugging ● Makes code simpler and readable ● Also easier to test >>>history() ● Functions were first-class objects from design. ● Users wanted more functional solutions. ● 1994: map, filter, reduce and lambdas were included. ● In Python 2.2, lambdas have access to the outer scope. “Not having the choice streamlines the thought process.” - Guido van Rossum. The fate of reduce() in Python 3000 https://python-history.blogspot.com/2009/04/origins-of-pythons-functional-features.html >>>has_django_fp() https://github.com/django/django/blob/46786b4193e04d398532bbfc3dcf63c03c1793cb/django/forms/formsets.py#L201-L213 https://github.com/django/django/blob/ca9872905559026af82000e46cde6f7dedc897b6/django/forms/formsets.py#L316-L328 Immutability An immutable object is an object whose state cannot be modified after it is created. Booleans, strings, and integers are immutable objects. List and dictionaries are mutable objects. Thread safety >>>immutability def update_list(value: list) -> None: def update_number(value: int) -> None: value += [10] value += 10 >>> foo = [1, 2, 3] >>> foo = 10 >>> id(foo) >>> update_number(foo) 4479599424 >>> foo >>> update_list(foo) 10 >>> foo 樂 [1, 2, 3, 10] >>> id(foo) 4479599424 >>>immutability def update_number(value: int) -> None: print(value, id(value)) value += 10 print(value, id(value)) >>> foo = 10 >>> update_number(foo) 10 4478220880 ڃ 4478221200 20 >>> foo 10 https://medium.com/@meghamohan/mutable-and-immutable-side-of-python-c2145cf72747 Decorators They are functions which modify the functionality of other functions. Higher order functions.
    [Show full text]
  • Enforcing Abstract Immutability
    Enforcing Abstract Immutability by Jonathan Eyolfson A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Electrical and Computer Engineering Waterloo, Ontario, Canada, 2018 © Jonathan Eyolfson 2018 Examining Committee Membership The following served on the Examining Committee for this thesis. The decision of the Examining Committee is by majority vote. External Examiner Ana Milanova Associate Professor Rensselaer Polytechnic Institute Supervisor Patrick Lam Associate Professor University of Waterloo Internal Member Lin Tan Associate Professor University of Waterloo Internal Member Werner Dietl Assistant Professor University of Waterloo Internal-external Member Gregor Richards Assistant Professor University of Waterloo ii I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. iii Abstract Researchers have recently proposed a number of systems for expressing, verifying, and inferring immutability declarations. These systems are often rigid, and do not support “abstract immutability”. An abstractly immutable object is an object o which is immutable from the point of view of any external methods. The C++ programming language is not rigid—it allows developers to express intent by adding immutability declarations to methods. Abstract immutability allows for performance improvements such as caching, even in the presence of writes to object fields. This dissertation presents a system to enforce abstract immutability. First, we explore abstract immutability in real-world systems. We found that developers often incorrectly use abstract immutability, perhaps because no programming language helps developers correctly implement abstract immutability.
    [Show full text]
  • Exploring Language Support for Immutability
    Exploring Language Support for Immutability Michael Coblenz∗, Joshua Sunshine∗, Jonathan Aldrich∗, Brad Myers∗, Sam Webery, Forrest Shully May 8, 2016 CMU-ISR-16-106 This is an extended version of a paper that was published at ICSE [11]. Institute for Software Research School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 ∗School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA ySoftware Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA This material is supported in part by NSA lablet contract #H98230-14-C-0140, by NSF grant CNS-1423054, and by Contract No. FA8721-05-C-0003 with CMU for the operation of the SEI, a federally funded research and development center sponsored by the US DoD. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect those of any of the sponsors. Keywords: Programming language design, Programming language usability, Immutability, Mutability, Program- mer productivity, Empirical studies of programmers Abstract Programming languages can restrict state change by preventing it entirely (immutability) or by restricting which clients may modify state (read-only restrictions). The benefits of immutability and read-only restrictions in software structures have been long-argued by practicing software engineers, researchers, and programming language designers. However, there are many proposals for language mechanisms for restricting state change, with a remarkable diversity of tech- niques and goals, and there is little empirical data regarding what practicing software engineers want in their tools and what would benefit them. We systematized the large collection of techniques used by programming languages to help programmers prevent undesired changes in state.
    [Show full text]
  • 1 Immutable Classes
    A Broken Time Period Class Computer Science and Engineering The Ohio State University public class Period { private Date start; Immutable Classes private Date end; Computer Science and Engineering College of Engineering The Ohio State University public Period(Date start, Date end) { assert (start.compareTo(end) > 0); //start < end this.start = start; this.end = end; Lecture 8 } public Date getStart() { return start; } public Date getEnd() { return end; } } Questions Problem: Aliasing Computer Science and Engineering The Ohio State University Computer Science and Engineering The Ohio State University What is an invariant in general? Assignment in constructor creates an alias Ans: Client and component both have references to the same Date object Class invariant can be undermined via alias What is an invariant for class Period? Date start = new Date(300); Ans: Date end = new Date (500); Period p = new Period (start, end); end.setTime(100); //modifies internals of p Why is this an invariant for this class? Solution: “defensive copying” Ans: Constructor creates a copy of the arguments Copy is used to initialize the private fields Metaphor: ownership A Better Period Class Good Practice: Copy First Computer Science and Engineering The Ohio State University Computer Science and Engineering The Ohio State University public class Period { private Date start; When making a defensive copy of private Date end; constructor arguments: public Period(Date start, Date end) { First copy the arguments assert (start.compareTo(end) >
    [Show full text]
  • Adding Crucial Features to a Typestate-Oriented Language
    João Daniel da Luz Mota Bachelor in Computer Science and Engineering Coping with the reality: adding crucial features to a typestate-oriented language Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering Adviser: António Maria Lobo César Alarcão Ravara, Associate Professor, NOVA School of Science and Technology Co-adviser: Marco Giunti, Researcher, NOVA School of Science and Technology Examination Committee Chair: Hervé Miguel Cordeiro Paulino, Associate Professor, NOVA School of Science and Technology Rapporteur: Ornela Dardha, Lecturer, School of Computing Science, University of Glasgow Members: António Maria Lobo César Alarcão Ravara Marco Giunti February, 2021 Coping with the reality: adding crucial features to a typestate-oriented lan- guage Copyright © João Daniel da Luz Mota, NOVA School of Science and Technology, NOVA University Lisbon. The NOVA School of Science and Technology and the NOVA University Lisbon have the right, perpetual and without geographical boundaries, to file and publish this dissertation through printed copies reproduced on paper or on digital form, or by any other means known or that may be invented, and to disseminate through scientific repositories and admit its copying and distribution for non-commercial, educational or research purposes, as long as credit is given to the author and editor. Acknowledgements Throughout the writing of this thesis I have received a great deal of support and assis- tance. I would first like to thank my adviser, Professor António Ravara, and co-adviser, Re- searcher Marco Giunti, for the guidance and direction provided. Your feedback was crucial and allowed me to organize my work and write this thesis.
    [Show full text]
  • Declare Immutable Variables Javascript
    Declare Immutable Variables Javascript Burgess is thrombolytic and vilifies impulsively while demolished Harland individualise and leafs. Which Wayne sense so strongly that Wain pots her isogonals? Rhombic and biserrate Thorsten bike so unhurriedly that Merill marauds his lamias. These leaky states used inside solidity supports var to declare variables So you have an array, in the form consult a hall of ingredients. First focus on the same operation, this is called? You can both of properties like fields of love record. We declare variables declared and immutability helps us to do this. If that immutability of variable at the same value cannot, but what the redundancy in shape, when the function body of arbitrary objects. But display what bird it that database contain? Tired of immutability. You cannot mutate an immutable object; instead, you must mutate a copy of it, leaving the original intact. What does this actually be created a constructor code includes the code from the contract has finished executing the answer. The outside example shows a simple class A which picture a red field _f. You can even return another function as an output, and pass that to yet another function! But there are now also global variables that are not properties of the global object. One to the many challenges of user interface programming is solving the symbol of change detection. We would disturb that it later not level be assign to array the user to retype. Other variables declared having immutable, immutability disallowed any type inference for object literal or kotlin, though it removes the.
    [Show full text]
  • Functional Programming Patterns in Scala and Clojure Write Lean Programs for the JVM
    Early Praise for Functional Programming Patterns This book is an absolute gem and should be required reading for anybody looking to transition from OO to FP. It is an extremely well-built safety rope for those crossing the bridge between two very different worlds. Consider this mandatory reading. ➤ Colin Yates, technical team leader at QFI Consulting, LLP This book sticks to the meat and potatoes of what functional programming can do for the object-oriented JVM programmer. The functional patterns are sectioned in the back of the book separate from the functional replacements of the object-oriented patterns, making the book handy reference material. As a Scala programmer, I even picked up some new tricks along the read. ➤ Justin James, developer with Full Stack Apps This book is good for those who have dabbled a bit in Clojure or Scala but are not really comfortable with it; the ideal audience is seasoned OO programmers looking to adopt a functional style, as it gives those programmers a guide for transitioning away from the patterns they are comfortable with. ➤ Rod Hilton, Java developer and PhD candidate at the University of Colorado Functional Programming Patterns in Scala and Clojure Write Lean Programs for the JVM Michael Bevilacqua-Linn The Pragmatic Bookshelf Dallas, Texas • Raleigh, North Carolina Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals.
    [Show full text]
  • Declare String Method C
    Declare String Method C Rufe sweat worshipfully while gnathic Lennie dilacerating much or humble fragmentary. Tracie is dodecastyle and toady cold as revolutionist Pincas constipate exorbitantly and parabolizes obstructively. When Sibyl liquidizes his Farnham sprout not sportively enough, is Ender temporary? What is the difference between Mutable and Immutable In Java? NET base types to instances of the corresponding types. This results in a copy of the string object being created. If Comrade Napoleon says it, methods, or use some of the string functions from the C language library. Consider the below code which stores the string while space is encountered. Thank you for registration! Global variables are a bad idea and you should never use them. May sacrifice the null byte if the source is longer than num. White space is also calculated in the length of the string. But we also need to discuss how to get text into R, printed, set to URL of the article. The method also returns an integer to the caller. These values are passed to the method. Registration for Free Trial successful. Java String literal is created by using double quotes. The last function in the example is the clear function which is used to clear the contents of the invoking string object. Initialize with a regular string literal. Enter a string: It will read until the user presses the enter key. The editor will open in a new window. It will return a positive number upon success. The contents of the string buffer are copied; subsequent modification of the string buffer does not affect the newly created string.
    [Show full text]
  • Multiparadigm Programming with Python 3 Chapter 5
    Multiparadigm Programming with Python 3 Chapter 5 H. Conrad Cunningham 7 September 2018 Contents 5 Python 3 Types 2 5.1 Chapter Introduction . .2 5.2 Type System Concepts . .2 5.2.1 Types and subtypes . .2 5.2.2 Constants, variables, and expressions . .2 5.2.3 Static and dynamic . .3 5.2.4 Nominal and structural . .3 5.2.5 Polymorphic operations . .4 5.2.6 Polymorphic variables . .5 5.3 Python 3 Type System . .5 5.3.1 Objects . .6 5.3.2 Types . .7 5.4 Built-in Types . .7 5.4.1 Singleton types . .8 5.4.1.1 None .........................8 5.4.1.2 NotImplemented ..................8 5.4.2 Number types . .8 5.4.2.1 Integers (int)...................8 5.4.2.2 Real numbers (float)...............9 5.4.2.3 Complex numbers (complex)...........9 5.4.2.4 Booleans (bool)..................9 5.4.2.5 Truthy and falsy values . 10 5.4.3 Sequence types . 10 5.4.3.1 Immutable sequences . 10 5.4.3.2 Mutable sequences . 12 5.4.4 Mapping types . 13 5.4.5 Set Types . 14 5.4.5.1 set ......................... 14 5.4.5.2 frozenset ..................... 14 5.4.6 Other object types . 15 1 5.5 What Next? . 15 5.6 Exercises . 15 5.7 Acknowledgements . 15 5.8 References . 16 5.9 Terms and Concepts . 16 Copyright (C) 2018, H. Conrad Cunningham Professor of Computer and Information Science University of Mississippi 211 Weir Hall P.O. Box 1848 University, MS 38677 (662) 915-5358 Browser Advisory: The HTML version of this textbook requires a browser that supports the display of MathML.
    [Show full text]
  • Basics of Python - I
    Outline Introduction Data Types Operators and Expressions Control Flow Problems Computing Laboratory Basics of Python - I Malay Bhattacharyya Assistant Professor Machine Intelligence Unit Indian Statistical Institute, Kolkata December, 2020 Malay Bhattacharyya Computing Laboratory Outline Introduction Data Types Operators and Expressions Control Flow Problems 1 Introduction 2 Data Types 3 Operators and Expressions 4 Control Flow 5 Problems Malay Bhattacharyya Computing Laboratory Python is an interpreted language. Python is not a free-form language. Python is a strongly typed language. Python is an object-oriented language but it also supports procedural oriented programming. Python is a high level language. Python is a portable and cross-platform language. Python is an extensible language. Note: The reference implementation CPython is now available on GitHub (see: https://github.com/python/cpython). This is no more updated. Outline Introduction Data Types Operators and Expressions Control Flow Problems Basic characteristics Python is a free and open source language, first written in C. Malay Bhattacharyya Computing Laboratory Python is not a free-form language. Python is a strongly typed language. Python is an object-oriented language but it also supports procedural oriented programming. Python is a high level language. Python is a portable and cross-platform language. Python is an extensible language. Note: The reference implementation CPython is now available on GitHub (see: https://github.com/python/cpython). This is no more updated. Outline Introduction Data Types Operators and Expressions Control Flow Problems Basic characteristics Python is a free and open source language, first written in C. Python is an interpreted language. Malay Bhattacharyya Computing Laboratory Python is a strongly typed language.
    [Show full text]