How can secure software be trusted?
نویسندگان
چکیده
The security of software applications is a major concern, especially for information owners, software developers and users. Increasingly, these stakeholders need to be confident that the software applications being developed are secure and can be trusted when used in the intended environment. However, a problem exists in terms of how to confidently address the security of software applications in order to protect the information to be stored, processed and transmitted by them, thereby increasing their associated levels of trust. The purpose of this paper is therefore to address some key aspects relating to the security and trustworthiness of a software application functioning within the intended environment. These key aspects include those relating to the security controls implemented and installed by the software developers and those involving the actual usage of the security controls implemented. CATEGORIES AND SUBJECT DESCRIPTORS
منابع مشابه
Augmenting Internet-based Card Not Present Transactions with Trusted Computing
In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...
متن کاملAugmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)
In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...
متن کاملAugmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
In this paper, we demonstrate how the staged roll out of Trusted Computing technology, beginning with ubiquitous client-side Trusted Platform Modules (TPMs), can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. This approach can be seen as an alternative to the proposed mass deployment of unconnected card readers in the provision of CNP transaction authoris...
متن کاملSecure Application Execution in Mobile Devices
Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart phone environment. From a security and privacy point of view, this seismic shift is creating new challenges, as the smart phone environment is bec...
متن کاملComposing a High-assurance Infrastructure out of Tcb Components
U.S. Government agencies and major vendors are actively attempting to secure critical infrastructure networks, but those efforts depend on patching unsecure, commodity systems, installing add-on security appliances, and applying other industry “best practices” that are ineffective against new attacks and software subversion. This has unfortunately led to the conclusion that it is impossible to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- South African Computer Journal
دوره 47 شماره
صفحات -
تاریخ انتشار 2011