Trust Management and Proof-carrying Code in Secure Mobile-code Applications a Position Paper Darpa Workshop on Foundations for Secure Mobile Code

نویسندگان

  • Joan Feigenbaum
  • Peter Lee
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Management and Proof Carrying Code in Secure Mobile Code Applications A Position Paper

The popularity of the Java programming language and the concomittant media attention given to the security holes that have been found in the Java run time system have brought the problem of mobile code security to center stage in the computer science research world In this essay we describe how the concepts of trust management and proof carrying code might be used in mobile code applications to...

متن کامل

Cryptographic Security for Mobile Code

This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with “encrypted functions” is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the...

متن کامل

Secure Execution of Mobile Java using Static Analysis and Proof Carrying Code

We consider the problems raised by the use of mobile code in e-Science. If a user submits a program for execution on a remote machine then problems can arise if the program misbehaves, for example by using too much memory or taking too long to execute. We describe methods which can be used to obtain unforgeable a priori guarantees that a mobile program will behave in a reasonable manner. We hav...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997