Abstract: In many application domains, objects are transferred, shared, and used across organizational and trust boundaries, which poses serious security concerns. Given the ubiquitous use of objects, it is important to assure at program run-time that the objects received and used have not been modified by any unauthorized program or entity, and are from the authorized programs. In this paper, we propose an authenticated model of objects that facilitates verification of authenticity of objects at program run-time and its possible Java-based implementations.
0 Replies
Loading