'Fabric' Would Tighten the Weave of Online Security
Cornell Chronicle (09/30/10) Bill Steele
Cornell University professors Fred Schneider and Andrew Myers are developing a way to incorporate security in the programming language used to write computer programs, so that the systems are protected from the beginning. Until now, computer security has been reactive, Schneider says. "Our defenses improve only after they have been successfully penetrated," he says. Schneider and Myers developed Fabric, a computer platform that replaces multiple existing layers with a simpler programming interface that makes security reasoning more direct. Fabric is designed to create secure systems for distributed computing, such as systems that move money around or control medical records. Fabric's programming language, which is based on Java, builds in security as the program is written. Myers says most of what Fabric does is transparent to the programmer. "I think we can make life simpler and improve performance," he says.
Showing posts with label p. Show all posts
Showing posts with label p. Show all posts
Thursday, September 30, 2010
Bloag: 'Fabric' Would Tighten the Weave of Online Security [...a way to incorporate security in the programming language used to write computer programs]
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2012
(35)
-
▼
April 2012
(13)
- Blog: Algorithmic Incentives
- Blog: Finding ET May Require Giant Robotic Leap
- Blog: New Julia Language Seeks to Be the C for Sci...
- Blog: Fast Data hits the Big Data fast lane
- Blog: Beyond Turing's Machines
- Blog: Cooperating Mini-Brains Show How Intelligenc...
- Blog: Transactional Memory: An Idea Ahead of Its Time
- Blog: Bits of Reality
- Blog: Berkeley Group Digs In to Challenge of Makin...
- Blog: Programming Computers to Help Computer Progr...
- Blog: To Convince People, Come at Them From Differ...
- Blog: Self-Sculpting Sand
- Blog: UMass Amherst Computer Scientist Leads the W...
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
▼
April 2012
(13)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
►
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless