DocumentCode
3218593
Title
Defense-enabled applications
Author
Webber, Franklin ; Pal, Partha P. ; Schantz, Richard E. ; Loyall, Joseph P.
Author_Institution
BBN Technol., Cambridge, MA, USA
Volume
2
fYear
2001
fDate
2001
Firstpage
119
Abstract
Some applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. We call any such application “defense-enabled”. This paper explains the principles behind defense enabling and the assumptions on which it depends
Keywords
security of data; defense-enabled applications; malicious attack resistance; untrustworthy environment; Application software; Communication system security; Computer networks; Computer security; Cryptography; Digital signatures; Hardware; Operating systems; Protection; Software systems;
fLanguage
English
Publisher
ieee
Conference_Titel
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
Conference_Location
Anaheim, CA
Print_ISBN
0-7695-1212-7
Type
conf
DOI
10.1109/DISCEX.2001.932164
Filename
932164
Link To Document