Containment and Integrity for Mobile Code
Final technical rept. Jun 1999-Mar 2004
CORNELL UNIV ITHACA NY
Pagination or Media Count:
Significant progress was made on general approaches for security policy enforcement and for building systems that are both fault-tolerant and secure. The work on policy enforcement is based on program analysis and program rewriting, the foundations of language- based security. Authorization, confidentiality, and integrity policies were addressed in a rich model that even admits mutual distrust among principals. Also, a formal characterization was developed for what policies can be enforced by various mechanisms. With regard to composing security and fault-tolerance, proactive threshold cryptographic protocols were developed and studied. Various prototype systems were built to evaluate the practicality of these protocols and the approach. The protocols make extremely weak assumptions about the system in which they are deployed.
- Computer Programming and Software
- Radio Communications