Building Trusted Components

نویسنده

  • Bertrand Meyer
چکیده

The most attractive benefits of component-based development can only be realized if the components are of a level of quality much higher than run-of-the-mill application software. This presentation will review a set of techniques for producing and qualifying such components. It will conclude with a discussion proof issues and techniques for proving programs with extensive use of pointers, as O-O components often do. This is a fairly technical presentation that assumes good knowledge of O-O and component techniques and some prior exposure to formal techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Virtual Trusted Platform

The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed toda...

متن کامل

Trust in Software Component Marketplaces

In electronic commerce trust building measures are one way to make a marketplace more attractive for suppliers and potential customers. Often trust on marketplaces is built up through external trusted third parties (TTPs). TTPs are organizations that deal with various trust-related problems and are themselves trusted by the customers. This paper describes the different trust problems that arose...

متن کامل

Composing a High-assurance Infrastructure out of Tcb Components

U.S. Government agencies and major vendors are actively attempting to secure critical infrastructure networks, but those efforts depend on patching unsecure, commodity systems, installing add-on security appliances, and applying other industry “best practices” that are ineffective against new attacks and software subversion. This has unfortunately led to the conclusion that it is impossible to ...

متن کامل

System Security, Platform Security and Usability * [extended Abstract] 1. Context and Setting

Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, evolving mesh of components. The bigger picture involves building up many additional layers to allow computing and communication across large-sc...

متن کامل

Distribution of Building Nonstructural Components in Height Subjected to Cost of Damage for Low-Rise Office Buildings

Exceeded losses of nonstructural components from structural ones in most demolished buildings in previous earthquakes and its limitation on functionality of critical facilities and building serviceability after earthquakes should be got the point of view for accounting loss of building as a merit for building performance. This paper attempts to demonstrate the significant role of distribution p...

متن کامل

Design Patterns for Building Secure Systems

In these notes we aim to capture some important patterns for building secure systems, and, in particular, what you can do at design time to improve security. How can you choose an architecture that will help reduce the likelihood of flaws in your system, or increase the likelihood that you will be able to survive such flaws? We begin with a powerful concept, the notion of a trusted computing ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001