Automatic Generation and Enforcement of Security Contract for Pervasive Application

被引:1
作者
Jin, Ying [1 ]
Li, Zepeng [1 ]
Wei, Da [1 ]
Liu, Lei [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun, Peoples R China
来源
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS | 2008年
关键词
D O I
10.1109/EUC.2008.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive computing is providing its usability and scope in almost eve?), aspect nowadays. In order to make better use of pervasive services in nomadic devices, pervasive client download might be needed, which would result in serious security problems due to executing untrusted applications. Recently Security-by-Contract has been proposed to address this problem, where an application is required to come with the contract containing a description of the relevant security features while mobile platform will match the contract with its own policy. In this paper a compositional approach to specifying security contract is introduced in the form of extended context free grammar. Then a framework for automatic generation and enforcement of security contract has been presented for Java platform. The main contributions of this paper include: (1) formal definition of security contract is given in the terms of security related operations and the relationship among arguments of these operation; (2) static analysis is utilized to automatically generate security contract or Java source program. The security contract of a Java program (,an be composed from those of all the methods it invokes; (3) runtime enforcement has been applied to security contracts and achieved by implementing execution monitor in JVM.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 13 条
[1]   ConSpec- A Formal Language for Policy Specification [J].
Aktug, Irem ;
Naliuka, Katsiaryna .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (01) :45-58
[2]  
ARTHO C, 2005, 1 INT WORKSH INT OBJ
[3]  
Artho Cyrille., 2001, 2001 AUSTR SOFTW, P68
[4]  
BARTHELEMY F, 1994, P 15 C COMP LING KYO, P454
[5]  
CHEN H, 2002, UCBCSD021197 U CAL E
[6]  
DESMET L, 2008, SECURITY BY CONTRACT, V13, P25
[7]   A security-by-contract architecture for pervasive services [J].
Dragoni, N. ;
Massacci, F. ;
Schaefer, C. ;
Walter, T. ;
Vetillard, E. .
THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, :49-+
[8]  
HAQUE M, 2006, INT J NETWORK SECURI, V3, P203
[9]  
Jin Y, 2007, P INT COMP SOFTW APP, P475
[10]  
Li Zhanfang, 2008, THESIS