Software revocation infrastructure

作者: Joseph Salowey , Max Pritikin

DOI:

关键词:

摘要: In one implementation, software components include an identity of a revocation authority. Prior to loading the in given platform, authority is checked for any messages. The creates component specific messages be revoked, rather than using certificate or individual licenses. mitigation information, such as instructions automatically configuring already installed without requiring update change code.

参考文章(31)
Jeffrey Canning, Lynda Slavens, Erik Johnson, System, method and program to distribute program updates ,(2004)
Lauri Paatero, Nadarajah Asokan, Rollback-Resistant Code-Signing ,(2007)
Murugappan Palaniappan, Secured distribution of software updates ,(2006)
Michael Dunn, Srivatsan Parthasarathy, Adriaan W. Canter, System and method for installing a software application in a non-impactfull manner ,(2003)
David W. Carman, Marvin A. Hein, James W. Morrow, Rollback attack prevention system and method ,(2004)
Nicholas Milton Hofmeister, Ryan Walter Jason Waite, Kevin John Savage, Miguel A. Claudio, Method for prompting a user to install and execute an unauthenticated computer application ,(2003)
Paul Gleichauf, David Thompson, Xiaoxue Ma, Timothy Kuik, Mark Bakke, Network context triggers for activating virtualized computer applications ,(2008)
Suyash Sinha, Adam D. Stritzel, Darryl E. Havens, Jose Manuel Bernabeu-Auban, Richard B. Ward, Mark R. Brown, Eric P. Traut, Tahsin Erdogan, Adriaan W. Canter, Catalog-based software component management ,(2009)