DocumentCode :
2480574
Title :
On the use of trusted objects to enforce isolation between processes and data
Author :
Tarman, Thomas D. ; Witzke, Edward L. ; Pierson, Lyndon G. ; Campbell, Philip L.
Author_Institution :
Sandia Nat. Labs., Albuquerque, NM, USA
fYear :
2002
fDate :
2002
Firstpage :
115
Lastpage :
119
Abstract :
This paper highlights the problem of run-time execution correctness of high-consequence applications in conventional Von Neumann computer architectures. It proposes an approach, trusted objects, in which the application program and data are cryptographically encapsulated in their own environment. The remainder of the paper is organized as follows: after presenting a description of trusted objects, their creation, and their execution, their potential applications are described. Finally, issues and problems requiring further research are discussed.
Keywords :
computer architecture; cryptography; data encapsulation; data integrity; object-oriented programming; Von Neumann computer architectures; cryptography; data encapsulation; data integrity checking; high-consequence applications; research; run-time execution correctness; trusted objects; Accreditation; Application software; Computer architecture; Cryptography; Java; Kernel; Laboratories; Operating systems; Protection; Runtime;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2002. Proceedings. 36th Annual 2002 International Carnahan Conference on
Print_ISBN :
0-7803-7436-3
Type :
conf
DOI :
10.1109/CCST.2002.1049235
Filename :
1049235
Link To Document :
بازگشت