What the heck is this application doing? - A security-by-contract architecture for pervasive services

N. Dragoni, F. Massacci, T. Walter, C. Schaefer

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Future pervasive environments are characterized by non-fixed architectures made of users and ubiquitous computers. They will be shaped by pervasive client downloads, i.e. new (untrusted) applications will be dynamically downloaded to make a better use of the computational power available in the ubiquitous computing environment. To address the challenges of this paradigm we propose the notion of security-by-contract (S × C), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries with itself. It describes the relevant security features of the application and the relevant security interactions with its computing environment. The contract can be used to check it against the device policy for compliance. In this paper we describe the S × C concepts, the S × C architecture and implementation and sketch some interaction modalities of the S × C paradigm. © 2009 Elsevier Ltd. All rights reserved.
Original languageEnglish
Pages (from-to)566-577
JournalComputers and Security
Volume28
Issue number7
DOIs
Publication statusPublished - Oct 2009
Externally publishedYes

Fingerprint

Dive into the research topics of 'What the heck is this application doing? - A security-by-contract architecture for pervasive services'. Together they form a unique fingerprint.

Cite this