Running untrusted code
started 3/10/2002; 5:29:49 AM - last post 3/11/2002; 4:55:14 AM
|
|
Ehud Lamm - Running untrusted code
3/10/2002; 5:29:49 AM (reads: 609, responses: 3)
|
|
Running untrusted code |
Olegs recommended this newsgroup posting, which lucidly explains the issues of running untrusted code. I agree that this has a great deal to do with programming languages. Indeed, we mentioned some of the theory concerned in the past (e.g., PCC).
Posted to general by Ehud Lamm on 3/10/02; 5:30:41 AM
|
|
|
|
Patrick Logan - Re: Running untrusted code
3/10/2002; 8:00:16 AM (reads: 630, responses: 1)
|
|
I wonder if all the options have been discussed in that thread. A google search indicates that Scheme48 has not been mentioned. I'm catching up on the details, but it appears to be a serious alternative to, say, Java-like sandboxes.
|
|
Ehud Lamm - Re: Running untrusted code
3/10/2002; 10:07:21 AM (reads: 685, responses: 0)
|
|
The subtle relations between language processors and trusted code is, of course, Thompson's classic Reflections on Trusting Trust.
I trust you've all read this one..
|
|
Ehud Lamm - Re: Running untrusted code
3/11/2002; 4:55:14 AM (reads: 621, responses: 0)
|
|
Since you guys are discussing capability based security, let me just point out the E was mentioned here on LtU awhile back.
|
|
|
|