Skip to main content

The Safe-Tcl Security Model

  • Chapter
  • First Online:
Mobile Agents and Security

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1419))

Abstract

Safe-Tcl is a mechanism for controlling the execution of programs written in the Tcl scripting language. It allows untrusted scripts (applets) to be executed while preventing damage to the environment or leakage of private information. Safe-Tcl uses a padded cell approach: each applet is isolated in a safe interpreter where it cannot interact directly with the rest of the application. The execution environment of the safe interpreter is controlled by trusted scripts running in a master interpreter. Safe-Tcl provides an alias mechanism that allows applets to request services from the master interpreter in a controlled fashion. Safe-Tcl allows a variety of security policies to be implemented within a single application, and it supports both policies that authenticate incoming scripts and those that do not.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Arnold and J. Gosling, The Java Programming Language, Addison-Wesley, ISBN 0-201-63455-4, 1996.

    Google Scholar 

  2. N. Borenstein, “EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail,” IFIP WG 6.5 Conference, Barcelona, May, 1994, North Holland, Amsterdam, 1994.

    Google Scholar 

  3. D. Denning and P. Denning, “Data Security,” Computing Surveys, Vol. 11, No. 3, September 1979, pp. 227–249.

    Article  Google Scholar 

  4. B. Lampson, “A Note on the Confinement Problem,” Communications of the ACM, Vol. 16, No. 10, October 1973, pp. 613–615.

    Article  Google Scholar 

  5. B. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in Distributed Systems: Theory and Practice,” ACM Transactions on Computer Systems, Vol. 10, No. 4, November 1992, pp. 265–310.

    Article  Google Scholar 

  6. J. Levy, Welcome to the Tcl Plugin, http://www.sunlabs.com/research/tcl/plugin/.

  7. Netscape Inc., “JavaScript in Navigator 3.0,” http://www.home.netscape.com/eng/mozilla/3.0/handbook/javascript/atlas.html#taint_dg.

  8. J. Ousterhout, Tcl and the Tk Toolkit, Addison-Wesley, ISBN 0-201-63337-X, 1994.

    Google Scholar 

  9. R. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.

    Google Scholar 

  10. R. Wahbe, S. Lucco, T. Anderson, and S. Graham, “Efficient Software-Based Fault Isolation,” Proc. 14th Symposium on Operating Systems Principles, Operating Systems Review, Vol. 27, No. 5, December, 1993, pp. 203–216.

    Article  Google Scholar 

  11. B. Welch, Practical Programming in Tcl and Tk, Prentice-Hall, ISBN 0-13-182007-9, 1995.

    Google Scholar 

  12. J. White, Telescript Technology: The Foundation for the Electronic Marketplace, white paper, General Magic, Inc., 1994.

    Google Scholar 

  13. F. Yellin, “Low Level Security in Java,” World-Wide Web Conference, Boston MA, December 1995. Also available as http://www.javasoft.com/sfaq/verifier.html.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ousterhout, J.K., Levy, J.Y., Welch, B.B. (1998). The Safe-Tcl Security Model. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-68671-1_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64792-8

  • Online ISBN: 978-3-540-68671-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics