SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation
نویسندگان
چکیده
We have developed a general approach to enable secure circulation of software in an open network environment such as the Internet By software circulation we mean a generalized conventional software distribution concept in which software can be transferred even in an iterative manner such as through redistribution or using mobile agents To clarify the problem that arises when software is circulated in an open network environment we rst considered a simple model for unsecure software circulation and then developed a model for secure software circulation SSC In the SSC model we extended the sandbox concept to include its own le system and to have the ability to be transferred via a network In this sense our approach is characterized by an encapsulated transferable le system We describe how the SoftwarePot system was designed to implement the SSC model and discuss the implications of experimental results that we obtained during the implementation
منابع مشابه
General Virtual Hosting with SoftwarePot Surányi , Péter ( Doctoral Program in Computer
Present-day computers provide sufficient resources to share them between hosting services for multiple Internet sites. This kind of resource sharing is called virtual hosting. However, continuous increase in the amount of network attacks force us to focus on security. In order to realize safe virtual hosting, resources for hosted services need to be isolated. Virtual machine managers (VMMs) are...
متن کاملAccuracy of an Intraoral Digital System for File Length Measurement
Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...
متن کاملModeling of Evolution to Secure Application System: from Requirements Model to Software Architecture
This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the comp...
متن کاملUser-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be available to my computation? Depending on the level of software, technical, and administrative support available, a data grid or a distributed file system would be reasonable solutions. However, it is not always possib...
متن کاملA Secure Web-Based File Exchange Server: Software Requirements Specification Document
This document presents brief software specification of a secure file exchange system prototype involving mutual authentication of the users via their browser and the application server with PKI-based certificates as credentials, the use of LDAP for credential management, and authentication between the application and database servers to maintain a high level of trust between all parties.
متن کامل