DocumentCode :
3218593
Title :
Defense-enabled applications
Author :
Webber, Franklin ; Pal, Partha P. ; Schantz, Richard E. ; Loyall, Joseph P.
Author_Institution :
BBN Technol., Cambridge, MA, USA
Volume :
2
fYear :
2001
fDate :
2001
Firstpage :
119
Abstract :
Some applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. We call any such application “defense-enabled”. This paper explains the principles behind defense enabling and the assumptions on which it depends
Keywords :
security of data; defense-enabled applications; malicious attack resistance; untrustworthy environment; Application software; Communication system security; Computer networks; Computer security; Cryptography; Digital signatures; Hardware; Operating systems; Protection; Software systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
Conference_Location :
Anaheim, CA
Print_ISBN :
0-7695-1212-7
Type :
conf
DOI :
10.1109/DISCEX.2001.932164
Filename :
932164
Link To Document :
بازگشت