Protecting externally supplied software in small computers:
The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, Mass.
Massachusetts Inst. of Technology, Laboratory for Computer Science
1980
|
Schlagworte: | |
Zusammenfassung: | The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example. In distributed systems comprised of autonomously managed nodes, members of the user community may act as vendors of external software in a less formal context. In these contexts dual security requirements arise: vendors require encapsulation of their software to prevent release and to detect modification of information, whereas users require confinement of external software in order to control its access to computer resources. The protection mechanisms developed to support mutually suspicious subsystems in centralized systems are not directly applicable here because of differences in the computing environment, e.g., the need to protect external subsystems from physical attacks mounted by owners of these small computers. This thesis employs two tools to achieve the security requirements of vendors of external software: tamper-resistance models (TRMs) and cryptographic techniques. External software can be confined in two ways: through the use of a secure operating system in conjunction with a TRM supplied by a third-party or by providing separate processors for vendors and users and employing some simple hardware to implement access control for the user. |
Beschreibung: | Zugl.: Diss. |
Beschreibung: | 254 S. |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021876351 | ||
003 | DE-604 | ||
005 | 20040229000000.0 | ||
007 | t | ||
008 | 880307s1980 |||| 00||| eng d | ||
035 | |a (OCoLC)227502556 | ||
035 | |a (DE-599)BVBBV021876351 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
088 | |a MIT/LCS/TR-255 | ||
100 | 1 | |a Kent, Stephen T. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Protecting externally supplied software in small computers |c by Stephan Thomas Kent |
264 | 1 | |a Cambridge, Mass. |b Massachusetts Inst. of Technology, Laboratory for Computer Science |c 1980 | |
300 | |a 254 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Zugl.: Diss. | ||
520 | 3 | |a The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example. In distributed systems comprised of autonomously managed nodes, members of the user community may act as vendors of external software in a less formal context. In these contexts dual security requirements arise: vendors require encapsulation of their software to prevent release and to detect modification of information, whereas users require confinement of external software in order to control its access to computer resources. The protection mechanisms developed to support mutually suspicious subsystems in centralized systems are not directly applicable here because of differences in the computing environment, e.g., the need to protect external subsystems from physical attacks mounted by owners of these small computers. This thesis employs two tools to achieve the security requirements of vendors of external software: tamper-resistance models (TRMs) and cryptographic techniques. External software can be confined in two ways: through the use of a secure operating system in conjunction with a TRM supplied by a third-party or by providing separate processors for vendors and users and employing some simple hardware to implement access control for the user. | |
650 | 7 | |a Access |2 dtict | |
650 | 7 | |a Administration and Management |2 scgdst | |
650 | 7 | |a Commerce |2 dtict | |
650 | 7 | |a Computer Hardware |2 scgdst | |
650 | 7 | |a Computer Programming and Software |2 scgdst | |
650 | 7 | |a Computer programming |2 dtict | |
650 | 7 | |a Control |2 dtict | |
650 | 7 | |a Cryptography |2 dtict | |
650 | 7 | |a Data processing security |2 dtict | |
650 | 7 | |a Executive routines |2 dtict | |
650 | 7 | |a Man computer interface |2 dtict | |
650 | 7 | |a Management planning and control |2 dtict | |
650 | 7 | |a Microcomputers |2 dtict | |
650 | 7 | |a Minicomputers |2 dtict | |
650 | 7 | |a Modular construction |2 dtict | |
650 | 7 | |a Vendors |2 dtict | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-015091970 |
Datensatz im Suchindex
_version_ | 1804135815826112512 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kent, Stephen T. |
author_facet | Kent, Stephen T. |
author_role | aut |
author_sort | Kent, Stephen T. |
author_variant | s t k st stk |
building | Verbundindex |
bvnumber | BV021876351 |
ctrlnum | (OCoLC)227502556 (DE-599)BVBBV021876351 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03330nam a2200541zc 4500</leader><controlfield tag="001">BV021876351</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040229000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">880307s1980 |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)227502556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021876351</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">MIT/LCS/TR-255</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kent, Stephen T.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting externally supplied software in small computers</subfield><subfield code="c">by Stephan Thomas Kent</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Mass.</subfield><subfield code="b">Massachusetts Inst. of Technology, Laboratory for Computer Science</subfield><subfield code="c">1980</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">254 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Zugl.: Diss.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example. In distributed systems comprised of autonomously managed nodes, members of the user community may act as vendors of external software in a less formal context. In these contexts dual security requirements arise: vendors require encapsulation of their software to prevent release and to detect modification of information, whereas users require confinement of external software in order to control its access to computer resources. The protection mechanisms developed to support mutually suspicious subsystems in centralized systems are not directly applicable here because of differences in the computing environment, e.g., the need to protect external subsystems from physical attacks mounted by owners of these small computers. This thesis employs two tools to achieve the security requirements of vendors of external software: tamper-resistance models (TRMs) and cryptographic techniques. External software can be confined in two ways: through the use of a secure operating system in conjunction with a TRM supplied by a third-party or by providing separate processors for vendors and users and employing some simple hardware to implement access control for the user.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Access</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Administration and Management</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Commerce</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Hardware</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Programming and Software</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer programming</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Control</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data processing security</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Executive routines</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Man computer interface</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management planning and control</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microcomputers</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Minicomputers</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Modular construction</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Vendors</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015091970</subfield></datafield></record></collection> |
id | DE-604.BV021876351 |
illustrated | Not Illustrated |
index_date | 2024-07-02T16:03:36Z |
indexdate | 2024-07-09T20:46:30Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015091970 |
oclc_num | 227502556 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 254 S. |
publishDate | 1980 |
publishDateSearch | 1980 |
publishDateSort | 1980 |
publisher | Massachusetts Inst. of Technology, Laboratory for Computer Science |
record_format | marc |
spelling | Kent, Stephen T. Verfasser aut Protecting externally supplied software in small computers by Stephan Thomas Kent Cambridge, Mass. Massachusetts Inst. of Technology, Laboratory for Computer Science 1980 254 S. txt rdacontent n rdamedia nc rdacarrier Zugl.: Diss. The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security. One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example. In distributed systems comprised of autonomously managed nodes, members of the user community may act as vendors of external software in a less formal context. In these contexts dual security requirements arise: vendors require encapsulation of their software to prevent release and to detect modification of information, whereas users require confinement of external software in order to control its access to computer resources. The protection mechanisms developed to support mutually suspicious subsystems in centralized systems are not directly applicable here because of differences in the computing environment, e.g., the need to protect external subsystems from physical attacks mounted by owners of these small computers. This thesis employs two tools to achieve the security requirements of vendors of external software: tamper-resistance models (TRMs) and cryptographic techniques. External software can be confined in two ways: through the use of a secure operating system in conjunction with a TRM supplied by a third-party or by providing separate processors for vendors and users and employing some simple hardware to implement access control for the user. Access dtict Administration and Management scgdst Commerce dtict Computer Hardware scgdst Computer Programming and Software scgdst Computer programming dtict Control dtict Cryptography dtict Data processing security dtict Executive routines dtict Man computer interface dtict Management planning and control dtict Microcomputers dtict Minicomputers dtict Modular construction dtict Vendors dtict Kryptologie (DE-588)4033329-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 s DE-604 Kryptologie (DE-588)4033329-2 s |
spellingShingle | Kent, Stephen T. Protecting externally supplied software in small computers Access dtict Administration and Management scgdst Commerce dtict Computer Hardware scgdst Computer Programming and Software scgdst Computer programming dtict Control dtict Cryptography dtict Data processing security dtict Executive routines dtict Man computer interface dtict Management planning and control dtict Microcomputers dtict Minicomputers dtict Modular construction dtict Vendors dtict Kryptologie (DE-588)4033329-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4011134-9 |
title | Protecting externally supplied software in small computers |
title_auth | Protecting externally supplied software in small computers |
title_exact_search | Protecting externally supplied software in small computers |
title_exact_search_txtP | Protecting externally supplied software in small computers |
title_full | Protecting externally supplied software in small computers by Stephan Thomas Kent |
title_fullStr | Protecting externally supplied software in small computers by Stephan Thomas Kent |
title_full_unstemmed | Protecting externally supplied software in small computers by Stephan Thomas Kent |
title_short | Protecting externally supplied software in small computers |
title_sort | protecting externally supplied software in small computers |
topic | Access dtict Administration and Management scgdst Commerce dtict Computer Hardware scgdst Computer Programming and Software scgdst Computer programming dtict Control dtict Cryptography dtict Data processing security dtict Executive routines dtict Man computer interface dtict Management planning and control dtict Microcomputers dtict Minicomputers dtict Modular construction dtict Vendors dtict Kryptologie (DE-588)4033329-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Access Administration and Management Commerce Computer Hardware Computer Programming and Software Computer programming Control Cryptography Data processing security Executive routines Man computer interface Management planning and control Microcomputers Minicomputers Modular construction Vendors Kryptologie Datenschutz |
work_keys_str_mv | AT kentstephent protectingexternallysuppliedsoftwareinsmallcomputers |