Accession Number : ADA327809
Title : Analysis of Secure Wrapping Technologies.
Descriptive Note : Final rept.,
Corporate Author : INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
Personal Author(s) : Meeson, Reginald N. ; Boone, John M. ; Gordon, Karen D. ; Mayfield, Terry ; Schneider, Edward A.
PDF Url : ADA327809
Report Date : FEB 1997
Pagination or Media Count : 42
Abstract : Networked computer systems are increasingly being threatened by inadvertent disruption and, at time, malicious attacks from other network users. This paper analyses the types, extent, and performance impacts of protection that might be achieved by applying software wrapping techniques to Dop legacy software systems and to commercial off-the-shelf (COTS) so ware products. Wrapping is a technique by which adapters are interposed at software interfaces, allowing new functions to be added. Architecture modeling techniques were used to verify that wrapping could be used to add services such as encryption, authentication, access controls, transactions logs, fault detection and correction, and redundancy to existing software systems. While the best solution for security in legacy systems and COTS software may ultimately be provided by their complete reengineering, our investigations confirm that wrapping techniques can provide an effective, near-term solution to a number of existing security problems. Techniques for ensuring the integrity of wrappers and wrapped software systems, and possibilities for additional functionality provided through wrappers require further investigation.
Descriptors : *COMPUTER PROGRAMS, *COMPUTER NETWORKS, CONTROL, FUNCTIONS, METHODOLOGY, DETECTION, COMPUTERS, INTERFACES, OFF THE SHELF EQUIPMENT, PROTECTION, ACCESS, ADAPTERS, ARCHITECTURE, PAPER, FAULTS.
Subject Categories : Computer Programming and Software
Distribution Statement : APPROVED FOR PUBLIC RELEASE