But what does 'global computing' actually mean? The term refers to abstractions such as overlay computers, which involves access to distributed mobile resources by software agents that are not tied to a specific geographical or logical network location.
The key challenge for systems designers and programmers in such scenarios is that the software agents have to operate within environments about which they have little information, and where other agents are not necessarily trustworthy.
“Your piece of software, alone and out there in the wild, doesn’t know who to trust and who not!” says Vladimiro Sassone of the University of Southampton, coordinator of the MYTHS project financed under the European Commission’s Future and Emerging Technologies (FET) initiative of the IST programme. “That is why closed networks exist. In a global computing environment you do not have the reassurance of a closed network – you are dealing with agents that you cannot trust. That is why security issues are paramount.”
However, if the global market for internet services and applications is to progress, systems designers need to develop adequate security guarantees for agent-based transactions. Specific domains have to be able to limit access to selected agents only. These agents also need to protect themselves and their data from attacks while traversing potentially hostile environments, or executing remotely outside the control of their originating locations. In other words, you need to give your car keys with a guarantee that the car will arrive (eventually) on your doorstep.
MYTHS, which completed in March 2005, sought specifically to develop ‘type’-based theories of security for mobile and distributed systems, as a possible route to solving such problems. “Types are fundamentally important because they express a property of a particular program or piece of code which is unvarying,” says Sassone. “Their other important property is that they can be checked by inspecting the code rather than running the program, which may be too big and complex to run easily.”
Starting with the principle that strong typing underpins truly secure computing applications, the MYTHS team focused on the foundations of programming languages and the paradigms that allow static detection of security violations. The team aimed to develop type-based methods and tools that would allow computing systems and applications to be formally analysed for security weaknesses.
Their results can be divided into three main areas. In resource access-control, in other words how to control access by software agents to specific resources, “We developed complex type systems to control access to certain resources – the type determines that a specific piece of code would never be able to migrate to certain areas of your network,” says Sassone. “For example the code could migrate to online shop one because you trust that outlet, but not to online shop two.”
In crypto-protocol analysis, cryptographic protocols are delicate and vulnerable to attack. Many protocols may actually reveal the content of the code by disclosing the behaviour of the system. Such protocols have in the past not been sufficiently well-designed to resist the more sophisticated forms of attack.
“We designed a tool called PEAR,” says Sassone, “which analyses protocol specifications by assigning types to various messages. The tool enables systems programmers to analyse how secure a protocol is, and to see if it will leak information when under attack.”
In the area of data manipulation, the project team developed a brand-new programming language for the manipulation of XML documents, facilitating the examination and analysis of XML data. The language, CDuce, is an innovative XML-oriented functional language which is type-safe, efficient and offers new methods of working with XML documents. A compiler is also available under an open-source licence.
Sassone emphasises that the work within MYTHS dealt with the foundations, with computational theory, but that it can nevertheless underpin real tools. “Types can be implanted in programming languages, to deliver code that can work out there in the real world.”
The PEAR tool for analysing cryptographic protocols has been further improved since the close of the project, and has been presented at several EU fora. Another key project result, the new CDuce XML programming language, has generated a great deal of interest. So much so that the project researcher specialising in this area is now working full-time on its further development.
Tara Morris | alfa
A novel hybrid UAV that may change the way people operate drones
28.03.2017 | Science China Press
Timing a space laser with a NASA-style stopwatch
28.03.2017 | NASA/Goddard Space Flight Center
The Institute of Semiconductor Technology and the Institute of Physical and Theoretical Chemistry, both members of the Laboratory for Emerging Nanometrology (LENA), at Technische Universität Braunschweig are partners in a new European research project entitled ChipScope, which aims to develop a completely new and extremely small optical microscope capable of observing the interior of living cells in real time. A consortium of 7 partners from 5 countries will tackle this issue with very ambitious objectives during a four-year research program.
To demonstrate the usefulness of this new scientific tool, at the end of the project the developed chip-sized microscope will be used to observe in real-time...
Astronomers from Bonn and Tautenburg in Thuringia (Germany) used the 100-m radio telescope at Effelsberg to observe several galaxy clusters. At the edges of these large accumulations of dark matter, stellar systems (galaxies), hot gas, and charged particles, they found magnetic fields that are exceptionally ordered over distances of many million light years. This makes them the most extended magnetic fields in the universe known so far.
The results will be published on March 22 in the journal „Astronomy & Astrophysics“.
Galaxy clusters are the largest gravitationally bound structures in the universe. With a typical extent of about 10 million light years, i.e. 100 times the...
Researchers at the Goethe University Frankfurt, together with partners from the University of Tübingen in Germany and Queen Mary University as well as Francis Crick Institute from London (UK) have developed a novel technology to decipher the secret ubiquitin code.
Ubiquitin is a small protein that can be linked to other cellular proteins, thereby controlling and modulating their functions. The attachment occurs in many...
In the eternal search for next generation high-efficiency solar cells and LEDs, scientists at Los Alamos National Laboratory and their partners are creating...
Silicon nanosheets are thin, two-dimensional layers with exceptional optoelectronic properties very similar to those of graphene. Albeit, the nanosheets are less stable. Now researchers at the Technical University of Munich (TUM) have, for the first time ever, produced a composite material combining silicon nanosheets and a polymer that is both UV-resistant and easy to process. This brings the scientists a significant step closer to industrial applications like flexible displays and photosensors.
Silicon nanosheets are thin, two-dimensional layers with exceptional optoelectronic properties very similar to those of graphene. Albeit, the nanosheets are...
20.03.2017 | Event News
14.03.2017 | Event News
07.03.2017 | Event News
28.03.2017 | Life Sciences
28.03.2017 | Information Technology
28.03.2017 | Physics and Astronomy