Back to Search Start Over

Taming of Pict.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Geffert, Viliam
Karhumäki, Juhani
Bertoni, Alberto
Preneel, Bart
Návrat, Pavol
Source :
SOFSEM 2008: Theory & Practice of Computer Science; 2008, p610-621, 12p
Publication Year :
2008

Abstract

This article presents additional necessary measures that enable us to use Pict as an object-capability programing language. It is desirable to be able to assess the worst possible threat that we—users—risk if we run a given program. If we know the threat, we are able to decide whether or not we are willing to risk running the program. The cost of a security audit that reveals such an assessment will be non-zero but it need not to be directly dependent on the size of the whole original program. It is possible to write programs in such a way that this analysis can be reliably performed on a fraction of the original program—on the trusted computing base. This technique does not always give the most accurate assessment but it gives sound and interesting assessment relatively cheaply. It does not prevent usage of other techniques that can further refine the initial assessment. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540775652
Database :
Complementary Index
Journal :
SOFSEM 2008: Theory & Practice of Computer Science
Publication Type :
Book
Accession number :
33770762
Full Text :
https://doi.org/10.1007/978-3-540-77566-9_53