Automatic Generation and Enforcement of Security Contract for Pervasive Application

被引:1
|
作者
Jin, Ying [1 ]
Li, Zepeng [1 ]
Wei, Da [1 ]
Liu, Lei [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun, Peoples R China
关键词
D O I
10.1109/EUC.2008.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive computing is providing its usability and scope in almost eve?), aspect nowadays. In order to make better use of pervasive services in nomadic devices, pervasive client download might be needed, which would result in serious security problems due to executing untrusted applications. Recently Security-by-Contract has been proposed to address this problem, where an application is required to come with the contract containing a description of the relevant security features while mobile platform will match the contract with its own policy. In this paper a compositional approach to specifying security contract is introduced in the form of extended context free grammar. Then a framework for automatic generation and enforcement of security contract has been presented for Java platform. The main contributions of this paper include: (1) formal definition of security contract is given in the terms of security related operations and the relationship among arguments of these operation; (2) static analysis is utilized to automatically generate security contract or Java source program. The security contract of a Java program (,an be composed from those of all the methods it invokes; (3) runtime enforcement has been applied to security contracts and achieved by implementing execution monitor in JVM.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 50 条
  • [1] What the heck is this application doing? - A security-by-contract architecture for pervasive services
    Dragoni, N.
    Massacci, F.
    Walter, T.
    Schaefer, C.
    COMPUTERS & SECURITY, 2009, 28 (07) : 566 - 577
  • [2] A security-by-contract architecture for pervasive services
    Dragoni, N.
    Massacci, F.
    Schaefer, C.
    Walter, T.
    Vetillard, E.
    THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, : 49 - +
  • [3] Automatic Enforcement of Security Properties
    Horcas, Jose-Miguel
    Pinto, Monica
    Fuentes, Lidia
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2016, 9830 : 19 - 31
  • [4] Automatic Enforcement of Security in Computer Networks
    Mechri, T.
    Langar, M.
    Mejri, M.
    Fujita, H.
    Funyu, Y.
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2007, 161 : 200 - 222
  • [5] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [6] Automatic Enforcement of Expressive Security Policies using Enclaves
    Gollamudi, Anitha
    Chong, Stephen
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 494 - 513
  • [7] Pervasive Home Security: An Intelligent Domotics Application
    Carchiolo, Vincenza
    Longheu, Alessandro
    Malgeri, Michele
    Mangioni, Giuseppe
    Torrisi, Danilo
    INTELLIGENT DISTRIBUTED COMPUTING IV, 2010, 315 : 155 - 164
  • [8] The Pervasive Trust Foundation for Security in Next Generation Networks
    Lilien, Leszek
    Al-Alawneh, Adawia
    Ben Othmane, Lotfi
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 129 - 141
  • [9] Adding Support for Automatic Enforcement of Security Policies in NFV Networks
    Basile, Cataldo
    Valenza, Fulvio
    Lioy, Antonio
    Lopez, Diego R.
    Pastor Perales, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) : 707 - 720
  • [10] Plenary Lecture 9 Formal and Automatic Enforcement of Security by Rewriting
    Mejri, Mohamed
    SELECTED TOPICS IN APPLIED COMPUTER SCIENCE, 2010, : 23 - 23