Location-independent naming for virtual distributed software repositories
SSR '95 Proceedings of the 1995 Symposium on Software reusability
Proceedings of the 4th ACM conference on Computer and communications security
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Security and identification indicators for browsers against spoofing and phishing attacks
ACM Transactions on Internet Technology (TOIT)
An architecture for storage-hosted application extensions
IBM Journal of Research and Development
Optimal assignment of mobile agents for software authorization and protection
Computer Communications
Hi-index | 0.00 |
The paper offers a solution to a problem of software distribution on the lnternet. The problem is that malicious software can be posted to the public with no accountability. When this software is run, it inherits the privileges of the user who runs it. Unfortunately, it is very common for users to execute software obtained on the Internet with no assurance that it is genuine. The solution offered here utilizes a trusted third party that signs certificates to identify the author of a program and to secure its integrity. A detailed design is provided. Finally, Bellcore's Trusted Software Integrity (Betsi) System, an implementation of the design, is presented.