Proceedings 13th Annual Computer Security Applications Conference
DOI: 10.1109/csac.1997.646187
|View full text |Cite
|
Sign up to set email alerts
|

Using type enforcement to assure a configurable guard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Throughout the paper it has been necessary to treat a n.pay output as being on a trusted path, that is, any component generating n.pay has to be reliable. In practice, if we know that only one message can be output at the end of an assured pipeline (as in [9]), then we could regard the P3-make-payment program (Example 8) as a potentially unreliable filter or integrity verification procedure (IVP), whose failure cannot result in the generation of multiple n.pay outputs.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Throughout the paper it has been necessary to treat a n.pay output as being on a trusted path, that is, any component generating n.pay has to be reliable. In practice, if we know that only one message can be output at the end of an assured pipeline (as in [9]), then we could regard the P3-make-payment program (Example 8) as a potentially unreliable filter or integrity verification procedure (IVP), whose failure cannot result in the generation of multiple n.pay outputs.…”
Section: Discussionmentioning
confidence: 99%
“…Failure of program P3 can result in multiple payments and therefore it is necessary to treat the payment program P3 as a reliable component. This is not an unreasonable assumption: for example, a typical guard pipeline regards that part that generates the output as trusted [9]. Thus, the infrastructure is modelled as …”
Section: Security Kernelsmentioning
confidence: 99%