Trust Management and Proof-carrying Code in Secure Mobile-code Applications a Position Paper Darpa Workshop on Foundations for Secure Mobile Code
نویسندگان
چکیده
منابع مشابه
Research on Proof-carrying Code for Mobile-code Security a Position Paper Darpa Workshop on Foundations for Secure Mobile Code
متن کامل
Trust Management and Proof Carrying Code in Secure Mobile Code Applications A Position Paper
The popularity of the Java programming language and the concomittant media attention given to the security holes that have been found in the Java run time system have brought the problem of mobile code security to center stage in the computer science research world In this essay we describe how the concepts of trust management and proof carrying code might be used in mobile code applications to...
متن کاملCryptographic Security for Mobile Code
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with “encrypted functions” is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the...
متن کاملSecure Execution of Mobile Java using Static Analysis and Proof Carrying Code
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program for execution on a remote machine then problems can arise if the program misbehaves, for example by using too much memory or taking too long to execute. We describe methods which can be used to obtain unforgeable a priori guarantees that a mobile program will behave in a reasonable manner. We hav...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کامل