Abstract | ||
---|---|---|
We describe a research program on design techniques to enable the cost-effective construction of trustworthy systems. The focus is on single-machine systems that can be formally verified to provide desired system-wide security and safety properties. Such systems are designed as compositions of small trusted components and large untrusted components whose behaviour is constrained by an underlying formally verified OS kernel. Past work has shown that building these systems is possible, now we wish to do so in a cost effective way. A key part of doing this is to design, as early as possible, an architecture that can provide the required trustworthiness properties. The research program envisions methods, models, analyses, and patterns to create and formally analyse such architectures. We present initial work on this program and discuss the gaps and research questions that will shape future research. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/WICSA-ECSA.212.54 | WICSA/ECSA |
Keywords | Field | DocType |
large untrusted component,architectural approach,os kernel,research question,initial work,research program,design technique,cost effective trustworthy systems,cost-effective construction,key part,past work,switches,trusted computing,formal verification,security,computer architecture,software architecture,data models | Data modeling,Research program,Architecture,Trusted Computing,Systems engineering,Trustworthiness,Computer science,Os kernel,Software architecture,Formal verification | Conference |
Citations | PageRank | References |
4 | 0.42 | 9 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ihor Kuz | 1 | 304 | 30.28 |
Liming Zhu | 2 | 195 | 31.59 |
Len Bass | 3 | 1501 | 162.21 |
Mark Staples | 4 | 515 | 38.02 |
Xiwei Xu | 5 | 360 | 33.53 |