Back to Search
Start Over
Security and Trust
- Source :
- Computer, Communication and Software Systems, SFM 2011, edited by Marco Bernardo and Valèrie Issarny, pp. 393–416. Berlin/Heidelberg: Springer-Verlag, 2011, info:cnr-pdr/source/autori:F. Martinelli, I. Matteucci, G. Costa, R. Saadi, V. Issarny/titolo:Security and Trust/titolo_volume:Computer, Communication and Software Systems, SFM 2011/curatori_volume:Marco Bernardo and Valèrie Issarny/editore: /anno:2011, SFM'11-11 th International School on Formal Methods for the Design of Computer, Communication and Software, SFM'11-11 th International School on Formal Methods for the Design of Computer, Communication and Software, Jun 2011, Bertinoro, Italy. pp.393-416, Formal Methods for Eternal Networked Software Systems ISBN: 9783642214547, SFM, Formal Methods for Eternal Networked Software Systems-11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, edited by Bernardo, Marco; Issarny, Valèrie, pp. 393–416. Berlin: Springer, 2011, info:cnr-pdr/source/autori:Martinelli F. [1]; Matteucci I. [1], Saadi R. [2], Costa G. [2], Issarny V. [2]/titolo:Security and Trust/titolo_volume:Formal Methods for Eternal Networked Software Systems-11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011/curatori_volume:Bernardo, Marco; Issarny, Valèrie/editore: /anno:2011
- Publication Year :
- 2011
- Publisher :
- Springer-Verlag, Berlin/Heidelberg, DEU, 2011.
-
Abstract
- Security and Trust offer two different prospectives on the problem of the correct interaction among software components. For many aspects, they represent complementary viewpoints. Moreover, in the study of the verification of non-functional properties of programs they represent a mainstream. Several security aspects, e.g., access control, could be based also on trust and, vice versa, trust models could update the level of trust of a (component of a ) system according to the satisfaction of a particular security policies. According to that, here we present the Security-by-Contract-with-Trust framework, S×C×T for short. It has been developed considering a system platform that has to execute an application whose developer is unknown in such a way that security policies set on it are not violated. The S×C×T mechanism is driven by both security and trust aspects. It is based of three main concepts: the application code, the application contract, and the system security policy The level of trust we consider measures the adherence of the application code to its contract, i.e., if the code respects its contract then the application is trusted, otherwise its level of trust decreases. According to the level of trust of the application, S×C×T decides if check the contract against the policies and if the answer is positive, execute the application just monitoring its contract, or directly enforce the security policy set on the platform. In order to better describe how the proposed mechanism works, we present its application to a mobile application marketplace scenarios. In this way we are also able to show its possible advantages in terms of performances and modularity.
- Subjects :
- Security analysis
Cloud computing security
business.industry
Computer science
SxCxT
[SCCO.COMP]Cognitive science/Computer science
Access control
02 engineering and technology
Security policy
Computer security
computer.software_genre
Trust
Web of trust
020204 information systems
0202 electrical engineering, electronic engineering, information engineering
Security
Network security policy
Trust anchor
020201 artificial intelligence & image processing
Computational trust
business
computer
ComputingMilieux_MISCELLANEOUS
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-642-21454-7
- ISBNs :
- 9783642214547
- Database :
- OpenAIRE
- Journal :
- Computer, Communication and Software Systems, SFM 2011, edited by Marco Bernardo and Valèrie Issarny, pp. 393–416. Berlin/Heidelberg: Springer-Verlag, 2011, info:cnr-pdr/source/autori:F. Martinelli, I. Matteucci, G. Costa, R. Saadi, V. Issarny/titolo:Security and Trust/titolo_volume:Computer, Communication and Software Systems, SFM 2011/curatori_volume:Marco Bernardo and Valèrie Issarny/editore: /anno:2011, SFM'11-11 th International School on Formal Methods for the Design of Computer, Communication and Software, SFM'11-11 th International School on Formal Methods for the Design of Computer, Communication and Software, Jun 2011, Bertinoro, Italy. pp.393-416, Formal Methods for Eternal Networked Software Systems ISBN: 9783642214547, SFM, Formal Methods for Eternal Networked Software Systems-11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, edited by Bernardo, Marco; Issarny, Valèrie, pp. 393–416. Berlin: Springer, 2011, info:cnr-pdr/source/autori:Martinelli F. [1]; Matteucci I. [1], Saadi R. [2], Costa G. [2], Issarny V. [2]/titolo:Security and Trust/titolo_volume:Formal Methods for Eternal Networked Software Systems-11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011/curatori_volume:Bernardo, Marco; Issarny, Valèrie/editore: /anno:2011
- Accession number :
- edsair.doi.dedup.....b30774cc354f089502bfe2fbd1f46252