What the heck is this application doing? - A security-by-contract architecture for pervasive services

نویسندگان

  • Nicola Dragoni
  • Fabio Massacci
  • Thomas Walter
  • Christian Schaefer
چکیده

Future pervasive environments are characterized by non-fixed architectures made of users and ubiquitous computers. They will be shaped by pervasive client downloads, i.e. new (untrusted) applications will be dynamically downloaded to make a better use of the computational power available in the ubiquitous computing environment. To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries with itself. It describes the relevant security features of the application and the relevant security interactions with its computing environment. The contract can be used to check it against the device policy for compliance. In this paper we describe the S×C concepts, the S×C architecture and implementation and sketch some interaction modalities of the S×C paradigm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Introduction of Education of Urban Studies in Analytical Approach

In order to understand what educational planning means, it is necessary to understand what is meant by planning and what a plan is. It is from this level that we will go into the explanation of educational planning in urban planning and architecture. The finding of research shows fundamental discourse that has been surveyed in this paper. Character of Educational Planning in urban studies concl...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

Modelling and Experimental Testing of Asymmetric Information Problems in Lease and Hire Contracts (Based on Contract Theory)

This article aims to study lease and hiring contract in the Iranian-Islamic setting and analyze the asymmetric information problem in these contracts. For doing this, we study the characteristics of lease and hiring contracts in Iran (real world experimental characteristics that recognized in other studies), using library method, then we mathematically model different aspects of asymmetric info...

متن کامل

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2009