Making Middleware Secure on Embedded Terminals
نویسندگان
چکیده
Recently more embedded terminals have begun to use a general-purpose OS such as Linux. These terminals can perform various functions, such as downloading applications. Since these applications maybe malicious, it is necessary to protect terminals against them and to ensure stability of services provided by the terminals. We have proposed a security enhanced middleware model for embedded terminals based on Linux (SEMMETL). The SEMMETL offers client identification, access control for each application and resource control for each application. The security enhanced X server (SEN XServer) is an example of our proposed SEMMETL. By applying the SEMMETL to middleware, we can enhance the security of embedded terminals and ensure stability.
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملSecure Method Invocation in JASON
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
متن کاملTowards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements
The development of next generation Embedded Peer-To-Peer Systems raises a number of challenging issues for pervasive computing. In this paper we overview the objectives of the ongoing European SMEPP (Secure Middleware for Embedded Peer-To-Peer) project. In particular we discuss different types of requirements that have been identified in SMEPP.
متن کاملA survey of secure middleware for the Internet of Things
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware ...
متن کاملUSENIX Association Proceedings of the 5 th Smart Card Research and Advanced Application
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007