Secure Encapsulation of Insecure Middleware
- 10.2991/jcis.2008.113How to use a DOI?
- Middleware, Encapsulation, Security, Calculus
Unceasingly developed and deeply exploited along with the software system, the variety of middlewares becomes more and more, they mutually affect each other in the complex way. These middlewares, because of the complex of the origin, are not extremely credible. So, before using these middlewares, we must understand the security features of them, for instance, the secret data cannot be leaked in the network. But, it is very difficult to confirm whether these middlewares have good security feature. The paper designs the encapsulations, which let these middlewares run under secure environment, and it provides the control of good granularity among the middlewares, the middleware and other system resources. The main part of this paper is to research the expression methods of the encapsulations, and we state and verify the security through these methods. This paper uses box- calculus to describe several kinds of encapsulations, and discuss the security tha
- © 2008, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Jian-min Zhao AU - Wei Zhang AU - Tian-gei Li PY - 2008/12 DA - 2008/12 TI - Secure Encapsulation of Insecure Middleware BT - Proceedings of the 11th Joint Conference on Information Sciences (JCIS 2008) PB - Atlantis Press SP - 672 EP - 677 SN - 1951-6851 UR - https://doi.org/10.2991/jcis.2008.113 DO - 10.2991/jcis.2008.113 ID - Zhao2008/12 ER -