首页> 外文会议>Institute of Electrical and Electronics Engineers International Conference on Pervasive Services >Mitigating Security Risks in Systems that Support Pervasive Services and Computing: Access-Driven Verification, Validation and Testing
【24h】

Mitigating Security Risks in Systems that Support Pervasive Services and Computing: Access-Driven Verification, Validation and Testing

机译:缓解支持普及服务和计算的系统中的安全风险:访问驱动验证,验证和测试

获取原文
获取外文期刊封面目录资料

摘要

Unique operational and environmental characteristics define pervasive services and computing; they, too, define an ideal atmosphere in which security risks flourish. Ever-present accessibility through the networked and wireless infrastructures, dependency on autonomous and often anonymous computing agents, and the ubiquitous nature of pervasive services make them both enticing and easy targets for ill-intentioned activities. To help mitigate that risk, we propose an adaptive, access-driven verification, validation and testing (VV&T) strategy that, through a Process/Object Model of Computation, (a) identifies those resources and software objects most susceptible to attack, (b) enumerates violable constraints and assumptions underlying those attacks, and (c) provides multi-level strategies incorporating resources, software objects, and constraints and assumptions to determine if, and to what extent, systems supporting pervasive computing are vulnerable to security exploits. The VV&T strategies are defined to accommodate various levels of access to the software development process and its artifacts.
机译:独特的操作和环境特征定义普及服务和计算;他们也定义了一个理想的氛围,安全风险蓬勃发展。通过联网和无线基础设施,依赖自主和匿名计算代理的依赖性,以及普遍存在服务的无处不在的性质,使其成为令人害羞和轻松的目标。为了帮助缓解该风险,我们提出了一种自适应,访问驱动的验证,验证和测试(VV&T)策略,通过计算/对象模型,(a)标识最容易受到攻击的资源和软件对象(b )枚举这些攻击的违规的约束和假设,(c)提供了包含资源,软件对象和约束和假设的多级策略,以确定支持普遍计算的系统是否易受安全利用的影响。 VV&T策略被定义为适应对软件开发过程及其工件的各种级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号