Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

Trust in global computing

13.07.2006
Access to distributed mobile resources by software agents of all types promises much for global computing. But it suffers from the same security and trust problems as the internet itself. Now new tools and protocols could lay the foundations for new and more secure high-level global computing.

But what does 'global computing' actually mean? The term refers to abstractions such as overlay computers, which involves access to distributed mobile resources by software agents that are not tied to a specific geographical or logical network location.

The key challenge for systems designers and programmers in such scenarios is that the software agents have to operate within environments about which they have little information, and where other agents are not necessarily trustworthy.

“Your piece of software, alone and out there in the wild, doesn’t know who to trust and who not!” says Vladimiro Sassone of the University of Southampton, coordinator of the MYTHS project financed under the European Commission’s Future and Emerging Technologies (FET) initiative of the IST programme. “That is why closed networks exist. In a global computing environment you do not have the reassurance of a closed network – you are dealing with agents that you cannot trust. That is why security issues are paramount.”

However, if the global market for internet services and applications is to progress, systems designers need to develop adequate security guarantees for agent-based transactions. Specific domains have to be able to limit access to selected agents only. These agents also need to protect themselves and their data from attacks while traversing potentially hostile environments, or executing remotely outside the control of their originating locations. In other words, you need to give your car keys with a guarantee that the car will arrive (eventually) on your doorstep.

MYTHS, which completed in March 2005, sought specifically to develop ‘type’-based theories of security for mobile and distributed systems, as a possible route to solving such problems. “Types are fundamentally important because they express a property of a particular program or piece of code which is unvarying,” says Sassone. “Their other important property is that they can be checked by inspecting the code rather than running the program, which may be too big and complex to run easily.”

Starting with the principle that strong typing underpins truly secure computing applications, the MYTHS team focused on the foundations of programming languages and the paradigms that allow static detection of security violations. The team aimed to develop type-based methods and tools that would allow computing systems and applications to be formally analysed for security weaknesses.

Their results can be divided into three main areas. In resource access-control, in other words how to control access by software agents to specific resources, “We developed complex type systems to control access to certain resources – the type determines that a specific piece of code would never be able to migrate to certain areas of your network,” says Sassone. “For example the code could migrate to online shop one because you trust that outlet, but not to online shop two.”

In crypto-protocol analysis, cryptographic protocols are delicate and vulnerable to attack. Many protocols may actually reveal the content of the code by disclosing the behaviour of the system. Such protocols have in the past not been sufficiently well-designed to resist the more sophisticated forms of attack.

“We designed a tool called PEAR,” says Sassone, “which analyses protocol specifications by assigning types to various messages. The tool enables systems programmers to analyse how secure a protocol is, and to see if it will leak information when under attack.”

In the area of data manipulation, the project team developed a brand-new programming language for the manipulation of XML documents, facilitating the examination and analysis of XML data. The language, CDuce, is an innovative XML-oriented functional language which is type-safe, efficient and offers new methods of working with XML documents. A compiler is also available under an open-source licence.

Sassone emphasises that the work within MYTHS dealt with the foundations, with computational theory, but that it can nevertheless underpin real tools. “Types can be implanted in programming languages, to deliver code that can work out there in the real world.”

The PEAR tool for analysing cryptographic protocols has been further improved since the close of the project, and has been presented at several EU fora. Another key project result, the new CDuce XML programming language, has generated a great deal of interest. So much so that the project researcher specialising in this area is now working full-time on its further development.

Tara Morris | alfa
Further information:
http://istresults.cordis.lu/

More articles from Information Technology:

nachricht New technology enables 5-D imaging in live animals, humans
16.01.2017 | University of Southern California

nachricht Fraunhofer FIT announces CloudTeams collaborative software development platform – join it for free
10.01.2017 | Fraunhofer-Institut für Angewandte Informationstechnik FIT

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: Designing Architecture with Solar Building Envelopes

Among the general public, solar thermal energy is currently associated with dark blue, rectangular collectors on building roofs. Technologies are needed for aesthetically high quality architecture which offer the architect more room for manoeuvre when it comes to low- and plus-energy buildings. With the “ArKol” project, researchers at Fraunhofer ISE together with partners are currently developing two façade collectors for solar thermal energy generation, which permit a high degree of design flexibility: a strip collector for opaque façade sections and a solar thermal blind for transparent sections. The current state of the two developments will be presented at the BAU 2017 trade fair.

As part of the “ArKol – development of architecturally highly integrated façade collectors with heat pipes” project, Fraunhofer ISE together with its partners...

Im Focus: How to inflate a hardened concrete shell with a weight of 80 t

At TU Wien, an alternative for resource intensive formwork for the construction of concrete domes was developed. It is now used in a test dome for the Austrian Federal Railways Infrastructure (ÖBB Infrastruktur).

Concrete shells are efficient structures, but not very resource efficient. The formwork for the construction of concrete domes alone requires a high amount of...

Im Focus: Bacterial Pac Man molecule snaps at sugar

Many pathogens use certain sugar compounds from their host to help conceal themselves against the immune system. Scientists at the University of Bonn have now, in cooperation with researchers at the University of York in the United Kingdom, analyzed the dynamics of a bacterial molecule that is involved in this process. They demonstrate that the protein grabs onto the sugar molecule with a Pac Man-like chewing motion and holds it until it can be used. Their results could help design therapeutics that could make the protein poorer at grabbing and holding and hence compromise the pathogen in the host. The study has now been published in “Biophysical Journal”.

The cells of the mouth, nose and intestinal mucosa produce large quantities of a chemical called sialic acid. Many bacteria possess a special transport system...

Im Focus: Newly proposed reference datasets improve weather satellite data quality

UMD, NOAA collaboration demonstrates suitability of in-orbit datasets for weather satellite calibration

"Traffic and weather, together on the hour!" blasts your local radio station, while your smartphone knows the weather halfway across the world. A network of...

Im Focus: Repairing defects in fiber-reinforced plastics more efficiently

Fiber-reinforced plastics (FRP) are frequently used in the aeronautic and automobile industry. However, the repair of workpieces made of these composite materials is often less profitable than exchanging the part. In order to increase the lifetime of FRP parts and to make them more eco-efficient, the Laser Zentrum Hannover e.V. (LZH) and the Apodius GmbH want to combine a new measuring device for fiber layer orientation with an innovative laser-based repair process.

Defects in FRP pieces may be production or operation-related. Whether or not repair is cost-effective depends on the geometry of the defective area, the tools...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

12V, 48V, high-voltage – trends in E/E automotive architecture

10.01.2017 | Event News

2nd Conference on Non-Textual Information on 10 and 11 May 2017 in Hannover

09.01.2017 | Event News

Nothing will happen without batteries making it happen!

05.01.2017 | Event News

 
Latest News

Multiregional brain on a chip

16.01.2017 | Power and Electrical Engineering

New technology enables 5-D imaging in live animals, humans

16.01.2017 | Information Technology

Researchers develop environmentally friendly soy air filter

16.01.2017 | Power and Electrical Engineering

VideoLinks
B2B-VideoLinks
More VideoLinks >>>