Building Trusted Components
نویسنده
چکیده
The most attractive benefits of component-based development can only be realized if the components are of a level of quality much higher than run-of-the-mill application software. This presentation will review a set of techniques for producing and qualifying such components. It will conclude with a discussion proof issues and techniques for proving programs with extensive use of pointers, as O-O components often do. This is a fairly technical presentation that assumes good knowledge of O-O and component techniques and some prior exposure to formal techniques.
منابع مشابه
Towards a Virtual Trusted Platform
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed toda...
متن کاملTrust in Software Component Marketplaces
In electronic commerce trust building measures are one way to make a marketplace more attractive for suppliers and potential customers. Often trust on marketplaces is built up through external trusted third parties (TTPs). TTPs are organizations that deal with various trust-related problems and are themselves trusted by the customers. This paper describes the different trust problems that arose...
متن کاملComposing a High-assurance Infrastructure out of Tcb Components
U.S. Government agencies and major vendors are actively attempting to secure critical infrastructure networks, but those efforts depend on patching unsecure, commodity systems, installing add-on security appliances, and applying other industry “best practices” that are ineffective against new attacks and software subversion. This has unfortunately led to the conclusion that it is impossible to ...
متن کاملSystem Security, Platform Security and Usability * [extended Abstract] 1. Context and Setting
Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, evolving mesh of components. The bigger picture involves building up many additional layers to allow computing and communication across large-sc...
متن کاملDistribution of Building Nonstructural Components in Height Subjected to Cost of Damage for Low-Rise Office Buildings
Exceeded losses of nonstructural components from structural ones in most demolished buildings in previous earthquakes and its limitation on functionality of critical facilities and building serviceability after earthquakes should be got the point of view for accounting loss of building as a merit for building performance. This paper attempts to demonstrate the significant role of distribution p...
متن کاملDesign Patterns for Building Secure Systems
In these notes we aim to capture some important patterns for building secure systems, and, in particular, what you can do at design time to improve security. How can you choose an architecture that will help reduce the likelihood of flaws in your system, or increase the likelihood that you will be able to survive such flaws? We begin with a powerful concept, the notion of a trusted computing ba...
متن کامل