Title :
Defense-enabled applications
Author :
Webber, Franklin ; Pal, Partha P. ; Schantz, Richard E. ; Loyall, Joseph P.
Author_Institution :
BBN Technol., Cambridge, MA, USA
Abstract :
Some applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. We call any such application “defense-enabled”. This paper explains the principles behind defense enabling and the assumptions on which it depends
Keywords :
security of data; defense-enabled applications; malicious attack resistance; untrustworthy environment; Application software; Communication system security; Computer networks; Computer security; Cryptography; Digital signatures; Hardware; Operating systems; Protection; Software systems;
Conference_Titel :
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
Conference_Location :
Anaheim, CA
Print_ISBN :
0-7695-1212-7
DOI :
10.1109/DISCEX.2001.932164