Communicating sequential processes
Communicating sequential processes
Computer security
MITRE technical report 2547, volume II
Journal of Computer Security
Model-based analysis of configuration vulnerabilities
Journal of Computer Security
Security Control for COTS Components
Computer
Composing Security-Aware Software
IEEE Software
Interface Theories for Component-Based Design
EMSOFT '01 Proceedings of the First International Workshop on Embedded Software
Enforcing Mandatory Integrity Protection in Operating System
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
How much is "enough"? Risk in Trust-Based Access Control
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Hi-index | 0.00 |
Security vulnerabilities posed by third-party software components in Component Based Development (CBD) is a serious impediment to its adoption in areas that offer great economic potential, particularly in areas such as embedded software and large-scale enterprise software. They raise questions about reliability and integrity of components, as well as the risks posed by any malicious code. This paper is a discussion of factors that affect component security and ways of assuring component security. Using a simplified model of Sendmail, it also outlines a formal framework that fits in with Communicating Sequential Processes (CSP) for modelling and analysis of component security.