In Components We Trust – Programming Language Support for Weak Protection

نویسنده

  • Franz Puntigam
چکیده

For many reasons we trust components just to some degree. Component users apply a number of methods to improve protection against malicious components. In this paper we briefly analyze some of these concepts and their relationships to our trust in components. It turns out that weak protection methods (those with potential security holes) can be beneficial for components we partially trust especially if potential holes are clearly visible. Visible holes build a basis for extending responsibility from the component user to the component supplier.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weighing and Prioritizing Branding Components of Tourism Objectives by Combining Meta synthesis Approach and Logistic Fuzzy Programming Preferences

The destination of tourism is a major element in tourism marketing. Branding tourism destination is a process by which a tourism destination develops its focal features, develops and delivers its main audience, can build a reputation, establish its reputation, strengthen slowly or even change, which is important for tourism purposes. Brand recognition is very important for communicating success...

متن کامل

Checking foundational proof certificates for first-order logic

We present the design philosophy of a proof checker based on a notion of foundational proof certificates. At the heart of this design is a semantics of proof evidence that arises from recent advances in the theory of proofs for classical and intuitionistic logic. That semantics is then performed by a (higher-order) logic program: successful performance means that a formal proof of a theorem has...

متن کامل

Checking Foundational Proof Certificates for First-Order Logic (Extended Abstract)

We present the design philosophy of a proof checker based on a notion of foundational proof certificates. At the heart of this design is a semantics of proof evidence that arises from recent advances in the theory of proofs for classical and intuitionistic logic. That semantics is then performed by a (higher-order) logic program: successful performance means that a formal proof of a theorem has...

متن کامل

Realizing Multi-Dimensional Software Adaptation

This paper describes the use of programming language constructs to support run-time software adaptation. A prototype language, Adaptive Java, contains primitives that permit programs to modify their own operation in a principled manner. In case studies, Adaptive Java is being used to support adaptation for different crosscutting concerns associated with heterogeneous mobile computing and critic...

متن کامل

Investigating the Effects of Social Components and Institutional Environment on Agricultural Entrepreneurship Development (Case Study: Fasa city)

This article aims to investigate the role of social and institutional factors on agricultural entrepreneurship development in Fasa city. The statistical population of the study is all those who have started a new business in the agricultural sector of Fasa in the last 5 years. The theoretical framework of Robert Putnam's theories of research is Francis Fukuyama on social networks and Mark Grano...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005