spacer
spacer search

Software Engineering for Service-Oriented Overlay Computers
Software Engineering for Service-Oriented Overlay Computers

Search
spacer
 
header
Main Menu
 
Home arrow Publications arrow All Publications

SENSORIA All Publications Print

Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

show main publications

Sensoria Bibliography Site Simulating Midlet's Security Claims with Automata Modulo Theory
Fabio Massacci, Ida Sri Rejeki Siahaan

abstract:
Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on its security behavior that could be matched against a mobile platform policy before downloading the code. In order to capture realistic scenarios with potentially infinite transitions (e.g. “only connections to urls starting with https”) we have proposed to represent those policies with the notion of Automata Modulo Theory (AMT ), an extension of B¨uchi Automata (BA), with edges labeled by expressions in a decidable theory. Our objective is the run-time matching of the mobile’s platform policy against the midlet’s security claims expressed as AMT . To this extent the use of on-the-fly product and emptiness test from automata theory may not be effective. In this paper we present an algorithm extending fair simulation between B¨uchi automata that can be more efficiently implemented.
spacer

The Sensoria Project Website
2005 - 2010
spacer