Abstract
In many application domains, objects are transferred, shared, and used across organizational and trust boundaries, which poses serious security concerns. Given the ubiquitous use of objects, it is important to assure at program run-time that the objects received and used have not been modified by any unauthorized program or entity, and are from the authorized programs. In this paper, we propose an authenticated model of objects that facilitates verification of authenticity of objects at program run-time and its possible Java-based implementations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. TISSECÂ 13(1), 4 (2009)
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504–513 (1977)
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
Kundu, A., Atallah, M., Bertino, E.: Leakage-free redactable signatures. In: CODASPY 2012 (2012)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Necula, G.: Proof-carrying code. In: POPL, pp. 106–119. ACM (1997)
Smith, G., et al.: A new type system for secure information flow. In: CSFW. IEEE (2001)
Sumii, E., Pierce, B.: A bisimulation for dynamic sealing. ACM SIGPLAN Notices 39, 161–172 (2004)
Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.: Improving application security with data flow assertions. In: SOSP 2009, pp. 291–304. ACM, New York (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Midi, D., Kundu, A., Bertino, E. (2013). Towards Authenticated Objects. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)