Book chapter
OA Policy
English

Secure Composition of Insecure Components

Published inTsichritzis, Dionysios (Ed.), Trusted objects = Objets de confiance, p. 257-303
PublisherGenève : Centre universitaire d'informatique
Publication date1999-07
Abstract

Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that personal data is not leaked to the net, but it is typically infeasible to verify that such components are well-behaved. Instead, they must be executed in a secure environment, or wrapper, that provides fine-grain control of the allowable interactions between them, and between components and other system resources. In this paper we study such wrappers, focusing on how they can be expressed in a way that enables their security properties to be stated and proved rigorously. We introduce a model programming language, the box-π calculus, that supports composition of software components and the enforcement of security policies. Several example wrappers are expressed using the calculus; we explore the delicate security properties they guarantee.

Citation (ISO format)
SEWELL, Peter, VITEK, Jan. Secure Composition of Insecure Components. In: Trusted objects = Objets de confiance. Tsichritzis, Dionysios (Ed.). Genève : Centre universitaire d’informatique, 1999. p. 257–303.
Main files (1)
Book chapter (Published version)
Identifiers
  • PID : unige:155912
126views
190downloads

Technical informations

Creation02/11/2021 12:04:00
First validation02/11/2021 12:04:00
Update time16/03/2023 02:41:03
Status update16/03/2023 02:41:02
Last indexation01/11/2024 00:35:48
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack