Show simple item record

Toward Secure Services from Untrusted Developers

dc.date.accessioned2007-08-06T15:21:49Z
dc.date.accessioned2018-11-24T10:25:40Z
dc.date.available2007-08-06T15:21:49Z
dc.date.available2018-11-24T10:25:40Z
dc.date.issued2007-08-06
dc.identifier.urihttp://hdl.handle.net/1721.1/38453
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/38453
dc.description.abstractWe present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, aside from covert timing channels, no part of the service cancorrupt private data or leak it between users or outside the systemwithout permission from the data's owners.Instead, owners may choose to reveal their data in a controlled manner.This application model is demonstrated by Muenster, a job searchwebsite that protects both the integrity and secrecy of each user's data.In spite of running untrusted code, Muenster and other services canprevent overt leaks because the untrusted modules are constrained bythe operating system to follow pre-specified security policies, whichare nevertheless flexible enough for programmers to do useful work.We build Muenster atop Asbestos, a recently described operating systembased on a form of decentralized information flowcontrol.
dc.format.extent20 p.
dc.subjectdecentralized information flow control
dc.subjectoperating systems
dc.subjectsecurity
dc.subjectweb services
dc.subjectuntrusted code
dc.subjectdebugging
dc.subjectpersistent storage
dc.titleToward Secure Services from Untrusted Developers


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2007-041.pdf237.9Kbapplication/pdfView/Open
MIT-CSAIL-TR-2007-041.ps1.495Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record