Book chapter
Open access

Secure Composition of Insecure Components

Published inTrusted objects = Objets de confiance, Editors Tsichritzis, Dionysios, p. 257-303
PublisherGenève : Centre universitaire d'informatique
Publication date1999-07

Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that personal data is not leaked to the net, but it is typically infeasible to verify that such components are well-behaved. Instead, they must be executed in a secure environment, or wrapper, that provides fine-grain control of the allowable interactions between them, and between components and other system resources. In this paper we study such wrappers, focusing on how they can be expressed in a way that enables their security properties to be stated and proved rigorously. We introduce a model programming language, the box-π calculus, that supports composition of software components and the enforcement of security policies. Several example wrappers are expressed using the calculus; we explore the delicate security properties they guarantee.

Citation (ISO format)
SEWELL, Peter, VITEK, Jan. Secure Composition of Insecure Components. In: Trusted objects = Objets de confiance. Genève : Centre universitaire d’informatique, 1999. p. 257–303.
Main files (1)
Book chapter (Published version)
  • PID : unige:155912

Technical informations

Creation11/02/2021 11:04:00 AM
First validation11/02/2021 11:04:00 AM
Update time03/16/2023 1:41:03 AM
Status update03/16/2023 1:41:02 AM
Last indexation02/12/2024 12:13:24 PM
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack