The Structure of Authority: Why Security Is Not a Separable Concern

نویسندگان

  • Mark S. Miller
  • Bill Tulloh
  • Jonathan S. Shapiro
چکیده

Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our principles, we could have both security and functionality. Treating security as a separate concern has not succeeded in bridging the gap between principle and practice, because it operates without knowledge of what constitutes least authority. Only when requests are made – whether by humans acting through a user interface, or by one object invoking another – can we determine how much authority is adequate. Without this knowledge, we must provide programs with enough authority to do anything they might be requested to do. We examine the practice of least authority at four major layers of abstraction – from humans in an organization down to individual objects within a programming language. We explain the special role of objectcapability languages – such as E or the proposed Oz-E – in supporting practical least authority. 1 Excess Authority: The Gateway to Abuse Software systems today are highly vulnerable to attack. This widespread vulnerability can be traced in large part to the excess authority we routinely grant programs. Virtually every program a user launches is granted the user’s full authority, even a simple game program like Solitaire. All widely-deployed operating systems today – including Windows, UNIX variants, Macintosh, and PalmOS – work on this principle. While users need broad authority to accomplish their various goals, this authority greatly exceeds what any particular program needs to accomplish its task. When you run Solitaire, it only needs the authority to draw in its window, to receive the UI events you direct at it, and to write into a file you specify in order to save your score. If you had granted it only this limited authority, a corrupted Solitaire might be annoying, but not a threat. It may prevent you from Bill Tulloh would like to thank the Critical Infrastructure Protection Project at George Mason University for its financial support of this research. P. Van Roy (Ed.): MOZ 2004, LNAI 3389, pp. 2–20, 2005. c © Springer-Verlag Berlin Heidelberg 2005 The Structure of Authority: Why Security Is not a Separable Concern 3 Application Dynamic Least Authority

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

A Review of the Performance of the International Atomic Energy Agency Regarding Pakistan’s Nuclear Activities

Among the significant issues of the subcontinental region, one can refer to the concern over Pakistan’s inability to maintain the security of its nuclear facilities, the illegal increase in its nuclear weapon production, extremist organizations’ access to nuclear weapons, as well as the fact that this country has not joined the NPT treaty. Meanwhile, the International Atomic Energy Agency (IAEA...

متن کامل

Modern Communication Technology and National Security In the Middle East

One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states.  Although national states, specially, in the third world countries, extremely resist...

متن کامل

جایگاه مؤلفه دفاعی – امنیتی در تحکیم و توسعه اقتدار ملی از منظر امام خمینی(ره) و آیت‌الله خامنه‌ای

In human societies, particularly in the area of politics and security, power that is linked to the basic concepts such as sovereignty and survival of vital values, has an important position. The power with features such as “legitimacy”, “influence” and “efficiency” is called authority. Governments always strive to maintain and expand their sources and methods of production and reproduction...

متن کامل

Villagization as a Policy Option to Rural Food Security: Facts from Villages in Assosa Zone, Benishangul-Gumuz Region, Ethiopia

Background: Villagization scheme was chosen as a policy option and implemented to ensure sustainable food security in Assosa zone, Benishangul-Gumuz region, Ethiopia, although it is blamed for intensifying food insecurity instead. Therefore, the present study aimed to examine the food security status of households gathered in planned villages in the framework of villagization. Methods: This cro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004