scholarly journals Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing

Author(s):  
Xinwen Zhang ◽  
Francesco Parisi-Presicce ◽  
Ravi Sandhu
Author(s):  
Andreas U. Schmidt ◽  
Andreas Leicher ◽  
Inhyok Cha

Enforcement and trust are opposite concepts in information security. This chapter reflects on the paradigm shift from traditional concepts of access control and policy enforcement toward de-centralised methods for establishing trust between loosely connected entities. By delegating parts of enforcement tasks to trusted elements dispersed in a system, the system can establish transitive trust relationships. This is the most advanced evolution of the organisational method of separation of duties within IT security. The technological basis for trust in systems – trusted computing platforms – is described on conceptual levels allowing comparison with other top-level security concepts and mapping to application domains. Important applications in modern information systems and networks are exhibited.


2005 ◽  
Author(s):  
R. Jason Weiss
Keyword(s):  

2009 ◽  
Vol 32 (7) ◽  
pp. 1304-1310 ◽  
Author(s):  
Ji-Qiang LIU ◽  
Jia ZHAO ◽  
Yong ZHAO
Keyword(s):  

2010 ◽  
Vol 33 (7) ◽  
pp. 1165-1176 ◽  
Author(s):  
Ming-Di XU ◽  
Huan-Guo ZHANG ◽  
Heng ZHAO ◽  
Jun-Lin LI ◽  
Fei YAN

2009 ◽  
Vol 29 (4) ◽  
pp. 920-923 ◽  
Author(s):  
Xin-qiang MA ◽  
Yi HUANG ◽  
Dan-ning LI
Keyword(s):  

2004 ◽  
Author(s):  
Fred B. Schneider ◽  
Andrew C. Myers
Keyword(s):  

2006 ◽  
Author(s):  
Keith Marzullo ◽  
Bennet Yee
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document