SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation

نویسندگان

  • Kazuhiko Kato
  • Yoshihiro Oyama
چکیده

We have developed a general approach to enable secure circulation of software in an open network environment such as the Internet By software circulation we mean a generalized conventional software distribution concept in which software can be transferred even in an iterative manner such as through redistribution or using mobile agents To clarify the problem that arises when software is circulated in an open network environment we rst considered a simple model for unsecure software circulation and then developed a model for secure software circulation SSC In the SSC model we extended the sandbox concept to include its own le system and to have the ability to be transferred via a network In this sense our approach is characterized by an encapsulated transferable le system We describe how the SoftwarePot system was designed to implement the SSC model and discuss the implications of experimental results that we obtained during the implementation

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

General Virtual Hosting with SoftwarePot Surányi , Péter ( Doctoral Program in Computer

Present-day computers provide sufficient resources to share them between hosting services for multiple Internet sites. This kind of resource sharing is called virtual hosting. However, continuous increase in the amount of network attacks force us to focus on security. In order to realize safe virtual hosting, resources for hosted services need to be isolated. Virtual machine managers (VMMs) are...

متن کامل

Accuracy of an Intraoral Digital System for File Length Measurement

Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...

متن کامل

Modeling of Evolution to Secure Application System: from Requirements Model to Software Architecture

This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the comp...

متن کامل

User-Level Remote Data Access in Overlay Metacomputers

A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be available to my computation? Depending on the level of software, technical, and administrative support available, a data grid or a distributed file system would be reasonable solutions. However, it is not always possib...

متن کامل

A Secure Web-Based File Exchange Server: Software Requirements Specification Document

This document presents brief software specification of a secure file exchange system prototype involving mutual authentication of the users via their browser and the application server with PKI-based certificates as credentials, the use of LDAP for credential management, and authentication between the application and database servers to maintain a high level of trust between all parties.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002