作者: Peter Herrmann
关键词: Trust management (information system) 、 Security policy 、 Software development 、 Reputation system 、 Component (UML) 、 Component-based software engineering 、 Computational trust 、 Computer science 、 Subjective logic 、 Computer security 、 Focus (computing)
摘要: Software component technology supports the cost-effective design of applications suited to particular needs application owners. This method, however, causes two new security risks. At first, a malicious may attack incorporating it. second, an owner incriminate designer falsely for any damage in his which reality was caused by somebody else. The first risk is addressed wrappers controlling behavior at interface runtime and enforcing certain policies order protect other components against attacks from monitored component. Moreover, we use trust management reduce significant performance overhead wrappers. Here, kind intensity monitoring adjusted according experience users with this Therefore so-called information service collects positive negative reports various users. Based on reports, special values are computed represent belief or disbelief all resp. uncertainty about adjust dependent its current value. In paper, focus second risk. To prevent that user sends wrong resulting bad value component, therefore would be wrongly incriminated, stores also based valuations validity checks sent report tested consistency log supplied together report. checked being correct as well. By Josang's subjective logic make degree, considered compute conditional upon user's own value. Thus, reputation cannot influence since their discounted.