DocumentCode
2994870
Title
Secure composition of insecure components
Author
Sewell, Peter ; Vitek, Jan
Author_Institution
Comput. Lab., Cambridge Univ., UK
fYear
1999
fDate
1999
Firstpage
136
Lastpage
150
Abstract
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user´s desktop may now consist of many smaller components that interact in intricate ways. Some components will be down-loaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g., that personal data is not leaked to the net, but it is typically infeasible to verify that such components are well behaved. Instead they must be executed in a secure environment, or wrapper, that provides fine grain control of the allowable interactions between them and between components and other system resources. We study such wrappers, focusing on how they can be expressed in a way that enables their security properties to be stated and proved rigorously. We introduce a model programming language, the box-π calculus that supports composition of software components and the enforcement of security policies. Several example wrappers are expressed using the calculus: we explore the delicate security properties they guarantee
Keywords
process algebra; security of data; software reusability; box-π calculus; data security; insecure components; model programming language; personal data; software components; software reuse; software wrapper; system resources; Application software; Assembly; Computer languages; Information processing; Java; Laboratories; Protection; Read only memory; Security; Software systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
Conference_Location
Mordano
ISSN
1063-6900
Print_ISBN
0-7695-0201-6
Type
conf
DOI
10.1109/CSFW.1999.779769
Filename
779769
Link To Document