Security-by-contract for the future internet

F. Massacci, F. Piessens, I. Siahaan

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

With the advent of the next generation java servlet on the smartcard, the Future Internet will be composed by web servers and clients silently yet busily running on high end smart cards in our phones and our wallets. In this brave new world we can no longer accept the current security model where programs can be downloaded on our machines just because they are vaguely "trusted". We want to know what they do in more precise details.We claim that the Future Internet needs the notion of security-by-contract:In a nutshell, a contract describes the security relevant interactions that the smart internet application could have with the smart devices hosting them. Compliance with contracts should verified at development time, checked at depolyment time and contracts should be accepted by the platform before deployment and possibly their enforcement guaranteed, for instance by in-line monitoring.In this paper we describe the challenges that must be met in order to develop a security-by-contract framework for the Future Internet and how security research can be changed by it.© Springer-Verlag Berlin Heidelberg 2009.
Original languageEnglish
Title of host publicationFuture Internet - FIS 2008 - First Future Internet Symposium, FIS 2008, Revised Selected Papers
Pages29-43
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event1st Future Internet Symposium, FIS 2008 - , Austria
Duration: 29 Sep 200830 Sep 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st Future Internet Symposium, FIS 2008
Country/TerritoryAustria
Period29/09/0830/09/08

Fingerprint

Dive into the research topics of 'Security-by-contract for the future internet'. Together they form a unique fingerprint.

Cite this