Abstract. Software component technology supports the cost-effective design of applications suited to the particular needs of the application owners. This design method, however, causes two new security risks. At first, a malicious component may attack the application incorporating it. At second, an application owner may incriminate a component designer falsely for any damage in his application which in reality was caused by somebody else. The first risk is addressed by security wrappers control-ling the behavior at the component interface at runtime and enforcing certain security policies in order to protect the other components of the application against attacks from the monitored component. Moreover, we use trust management to reduce the ...
Existing software applications become increasingly distributed as their continuity and lifetimes are...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-e...
It is a normal practice by developers to reuse components. But reusing of components can cause a sig...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
This paper presents a security characterisation process framework for software components and their ...
Component-based software architecture enables extending the functionality of a system with additiona...
Software systems are increasingly assembled from components that are developed by and purchased from...
We present a security characterisation process framework for software components and their compositi...
Abstract. The secure deployment of components is widely recognized as a cru-cial problem in componen...
Software systems are increasingly being assembled from components that are developed by and purchase...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
AbstractComponent-based systems use software components to achieve their overall high-level function...
Software productivity has been a problem since the 1960\u27s. Projects are often delayed, over budge...
Using software components to develop mission-critical systems poses a number of technical, organizat...
Existing software applications become increasingly distributed as their continuity and lifetimes are...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-e...
It is a normal practice by developers to reuse components. But reusing of components can cause a sig...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
This paper presents a security characterisation process framework for software components and their ...
Component-based software architecture enables extending the functionality of a system with additiona...
Software systems are increasingly assembled from components that are developed by and purchased from...
We present a security characterisation process framework for software components and their compositi...
Abstract. The secure deployment of components is widely recognized as a cru-cial problem in componen...
Software systems are increasingly being assembled from components that are developed by and purchase...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
AbstractComponent-based systems use software components to achieve their overall high-level function...
Software productivity has been a problem since the 1960\u27s. Projects are often delayed, over budge...
Using software components to develop mission-critical systems poses a number of technical, organizat...
Existing software applications become increasingly distributed as their continuity and lifetimes are...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-e...