首页> 外文会议>Advances in Information and Computer Security; Lecture Notes in Computer Science; 4266 >Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing
【24h】

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing

机译:使用可信计算实现对移动代码运行时保护的远程策略执行

获取原文
获取原文并翻译 | 示例

摘要

We present an approach to protect mobile code and agents at runtime using Trusted Computing (TC) technologies. For this purpose, a "mobile policy" is defined by the mobile code originator, and is enforced by the runtime environment in a remote host to control which users can run the mobile code and what kind of results a user can observe, depending on the security properties of the user. The separation of policy specification and implementation mechanism in existing mobile computing platform such as Java Runtime Environment (JRE) enables the implementation of our approach by leveraging current security technologies. The main difference between our approach and existing runtime security models is that the policies enforced in our model are intended to protect the resources of the mobile applications instead of the local system resources. This requires the remote runtime environment to be trusted by the application originator to authenticate the remote user and enforce the policy. Emerging TC technologies such as specified by the Trusted Computing Group (TCG) provide assurance of the runtime environment of a remote host.
机译:我们提出一种使用可信计算(TC)技术在运行时保护移动代码和代理的方法。为此,“移动策略”由移动代码发起者定义,并由远程主机中的运行时环境强制执行,以控制哪些用户可以运行该移动代码以及用户可以观察到哪种结果,具体取决于用户的安全属性。现有的移动计算平台(例如Java Runtime Environment(JRE))中的策略规范和实现机制的分离使我们可以利用当前的安全技术来实现我们的方法。我们的方法与现有的运行时安全性模型之间的主要区别在于,在我们的模型中实施的策略旨在保护移动应用程序的资源,而不是本地系统资源。这要求应用程序创建者信任远程运行时环境,以认证远程用户并实施策略。诸如可信计算组(TCG)所指定的新兴TC技术可确保远程主机的运行时环境。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号