In Components We Trust – Programming Language Support for Weak Protection
نویسنده
چکیده
For many reasons we trust components just to some degree. Component users apply a number of methods to improve protection against malicious components. In this paper we briefly analyze some of these concepts and their relationships to our trust in components. It turns out that weak protection methods (those with potential security holes) can be beneficial for components we partially trust especially if potential holes are clearly visible. Visible holes build a basis for extending responsibility from the component user to the component supplier.
منابع مشابه
Weighing and Prioritizing Branding Components of Tourism Objectives by Combining Meta synthesis Approach and Logistic Fuzzy Programming Preferences
The destination of tourism is a major element in tourism marketing. Branding tourism destination is a process by which a tourism destination develops its focal features, develops and delivers its main audience, can build a reputation, establish its reputation, strengthen slowly or even change, which is important for tourism purposes. Brand recognition is very important for communicating success...
متن کاملChecking foundational proof certificates for first-order logic
We present the design philosophy of a proof checker based on a notion of foundational proof certificates. At the heart of this design is a semantics of proof evidence that arises from recent advances in the theory of proofs for classical and intuitionistic logic. That semantics is then performed by a (higher-order) logic program: successful performance means that a formal proof of a theorem has...
متن کاملChecking Foundational Proof Certificates for First-Order Logic (Extended Abstract)
We present the design philosophy of a proof checker based on a notion of foundational proof certificates. At the heart of this design is a semantics of proof evidence that arises from recent advances in the theory of proofs for classical and intuitionistic logic. That semantics is then performed by a (higher-order) logic program: successful performance means that a formal proof of a theorem has...
متن کاملRealizing Multi-Dimensional Software Adaptation
This paper describes the use of programming language constructs to support run-time software adaptation. A prototype language, Adaptive Java, contains primitives that permit programs to modify their own operation in a principled manner. In case studies, Adaptive Java is being used to support adaptation for different crosscutting concerns associated with heterogeneous mobile computing and critic...
متن کاملInvestigating the Effects of Social Components and Institutional Environment on Agricultural Entrepreneurship Development (Case Study: Fasa city)
This article aims to investigate the role of social and institutional factors on agricultural entrepreneurship development in Fasa city. The statistical population of the study is all those who have started a new business in the agricultural sector of Fasa in the last 5 years. The theoretical framework of Robert Putnam's theories of research is Francis Fukuyama on social networks and Mark Grano...
متن کامل