Runtime Environment Security Models
نویسنده
چکیده
The tremendous new potential offered by distributed computing, inside and outside the home and business, also carries with it the necessity to exercise certain security safeguards. As distributed, mobile, and executable content moves among devices, the opportunity for security breaches increases dramatically. Also, as device-todevice e-Commerce services become more automated [11], new types of security threats are emerging. With these drastic changes in computing models comes a greater need for robust application security. For example, “executable content” is the idea of sending code to a remote compute engine to be executed. In addition to flexibility and expressiveness, executable content brings new potential problems. A program received from a remote source must be regarded as nontrusted to some degree, and its access to certain resources must be restricted. However, this new execution model is not bound by the limitations of the operating system because the runtime environment enforces the security policies based on the code’s origin. Both the Java Runtime Environment (JRE) and .NET Framework Common Language Runtime (CLR) security models have the following common security features: language typesafety, bytecode verification, runtime type checking, name space separation via class loading, and fine-grained access control. This paper compares the JRE and the CLR evolutionary security mechanisms. The paper also compares the two models to the Clark-Wilson security model, a formal, application-level model used to ensure the integrity of commercial data. The Clark-Wilson model is a formal presentation of the security policy enforced by a system, and it is useful for testing a policy for completeness and ∗ Other brands and names are the property of their respective owners. consistency. It also helps describe what specific mechanisms are necessary to implement a security policy. Besides exploring the nature and scope of the sandboxbased JRE and CLR security models and comparing them to the Clark-Wilson integrity model, this paper also provides some insight into the future of runtime security.
منابع مشابه
Enterprise Models as Drivers for IT Security Management at Runtime
This paper describes how enterprise models can be made suitable for monitoring and controlling IT security at runtime. A holistic modeling method is proposed that extends enterprise models with runtime information, turning them into dashboards for managing security incidents and risks, and supporting decision making at runtime. The requirements of such a modeling method are defined and an exist...
متن کاملTowards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing
We present an approach to protect mobile code and agents at runtime using Trusted Computing (TC) technologies. For this purpose, a “mobile policy” is defined by the mobile code originator, and is enforced by the runtime environment in a remote host to control which users can run the mobile code and what kind of results a user can observe, depending on the security properties of the user. The se...
متن کاملASITA: advanced security infrastructure for multi-agent applications in the telematic area
An approach to solve the security aspects raised by agent systems, especially with mobile code and in an open environment, in the context of telecommunication applications is presented. A scenario is given that represents a typical user approach to tomorrow’s integrated services. Typical applications and services are thoroughly characterized, electronic markets are introduced, the players in th...
متن کاملAdaptive Security Policy Model to Deploy Business Process in Cloud Infrastructure
The development of collaborative service ecosystem relies mostly on software services spanning multiple organisations in order to provide agile support for business applications. By moving part of their information system on Cloud infrastructure, companies take advantage of new Business models and scalable environments, increasing IT productivity while reducing IS management costs. Nevertheless...
متن کاملPreventing Key Performance Indicators Violations Based on Proactive Runtime Adaptation in Service Oriented Environment
Key Performance Indicator (KPI) is a type of performance measurement that evaluates the success of an organization or a partial activity in which it engages. If during the running process instance the monitoring results show that the KPIs do not reach their target values, then the influential factors should be identified, and the appropriate adaptation strategies should be performed to prevent ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003