Trust-adapted enforcement of security policies in distributed component-structured applications
- 13 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Software component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however, it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each component is controlled by a wrapper which monitors the component's behavior and checks its compliance with the security behavior constraints of the component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, shortly outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.Keywords
This publication has 18 references indexed in Scilit:
- A framework for modeling transfer protocolsComputer Networks, 2000
- The Role of Trust Management in Distributed Systems SecurityPublished by Springer Nature ,1999
- REFEREE: trust management for Web applicationsComputer Networks and ISDN Systems, 1997
- Towards fault-tolerant and secure agentryPublished by Springer Nature ,1997
- A security model for AgletsIEEE Internet Computing, 1997
- TILPublished by Association for Computing Machinery (ACM) ,1996
- Extensibility safety and performance in the SPIN operating systemPublished by Association for Computing Machinery (ACM) ,1995
- The temporal logic of actionsACM Transactions on Programming Languages and Systems, 1994
- Valuation of trust in open networksPublished by Springer Nature ,1994
- Efficient software-based fault isolationPublished by Association for Computing Machinery (ACM) ,1993