Software authorization utilizing software reputation

作者: Thekkthalackal Varugis Kurien , David B. Cross , Scott A. Field

DOI:

关键词: World Wide WebSoftware peer reviewSoftware systemPersonal software processSoftware qualitySoftware walkthroughSoftware reviewComputer scienceSoftware as a serviceCrowdsourcing software development

摘要: Software is authorized in accordance with a reputation of the software. A trust author and/or publisher software determined via digital signatures CoAs, and utilized to determine intent The can be local service, such as an enterprise IT department determination service. When downloaded or executed, author/publisher using CoAs associated If trusted, service called installed executed dependent upon trustworthiness author/publisher.

参考文章(47)
Tom Karygiannis, Wayne Jansen, NIST Special Publication 800-19 – Mobile Agent Security ,(2000)
Joseph R. Spadea, Controlling transmission of email ,(2005)
Michael Dunn, Srivatsan Parthasarathy, Adriaan W. Canter, System and method for installing a software application in a non-impactfull manner ,(2003)
Kwei-Jay Lin, Haiyin Lu, Tao Yu, Chia-en Tai, A reputation and trust management broker framework for Web applications ieee international conference on e-technology, e-commerce and e-service. pp. 262- 269 ,(2005) , 10.1109/EEE.2005.14
Alma Whitten, J. D. Tygar, WWW electronic commerce and java trojan horses WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 15- 15 ,(1996)
Ronald A Franczyk, Sterling M Reasor, Jason Garms, Andrew J Newman, Christopher Ryan Jones, Feedback-driven malware detector ,(2005)
David B. Cross, Varugis Kurien, Scott A. Field, Reputation-Based Authorization Decisions ,(2007)