Security-by-contract on the .NET platform
نویسندگان
چکیده
Over the last few years, the success of GPS-enabled PDAs has finally instigated a breakthrough of mobile devices. Many people now already have a device that can connect to the internet and run untrusted code, typically a cell-phone or PDA. Having such a large interconnected and powerful computing base presents some new security issues. In order to counter new threats, the traditional security architectures need to be overhauled to support a new and more flexible way of securely executing mobile code. This article describes the concept of security-by-contract (SxC) and its implementation on the .NET platform. This new model allows users to guarantee that an untrusted application remains within the boundaries of acceptable behavior, as defined by the user herself. A number of different techniques will be presented that can be employed to enforce this behavior. In order to support the SxC paradigm, some new steps can be introduced in the application development process. In addition to building an application, developers can create an application contract and securely bind this contract to the application. The application deployment process supports legacy applications developed without such contracts, but it can support more advanced enforcement technologies for those applications that are SxC aware.
منابع مشابه
Impact of a Contract Farming Scheme on Income, Food Security, and Nutrition among Maize Farmers in North Western, Nigeria
Background: The study examined the impact of a contract farming scheme on the farmers’ income, food security, and nutrition. Methods: Simple random sampling was used to select 100 respondents for the study. Data were analyzed using descriptive and inferential statistics as well the Propensity Score Matching technique. Results: The major determinants of participation in contract farming included...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملThe Impact of Perceived Organizational Support through the Mediating Role of Psychological Contract Violation on Work Outcomes
. Perceived organizational support has been raised as work backbone of employee in the organization and the psychological contracts are also a set of promises that top managers give to support their employees. Therefore, violation of this contract not only involves depriving organizational support, but also reduces the employee's belongings. The main purpose of this paper was to examine the imp...
متن کاملSecurity-by-Contract for the OSGi Platform
The natural business model of OSGi is dynamic loading and removal of bundles or services on an OSGi platform. If bundles can come from different stakeholders, how do we make sure that one’s services will only be invoked by the authorized bundles? A simple solution is to interweave functional and security logic within each bundle, but this decreases the benefits of using a common platform for se...
متن کاملComparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity
Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Sec. Techn. Report
دوره 13 شماره
صفحات -
تاریخ انتشار 2008