[1627] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Java "security holes'

daemon@ATHENA.MIT.EDU (Marianne Mueller)
Wed Mar 13 17:10:57 1996

Date: Wed, 13 Mar 1996 11:05:16 -0800
From: mrm@doppio.Eng.Sun.COM (Marianne Mueller)
To: chess@watson.ibm.com
Cc: www-security@ns2.rutgers.edu
In-Reply-To: <199603131715.MAA06090@ns2.rutgers.edu> (chess@watson.ibm.com)
Errors-To: owner-www-security@ns2.rutgers.edu

I should issue disclaimers on all email ... :-) 

I agree, an "implementor's guide" relies on an articulated security
model.  

It's hard to argue with this statement:

  A security model should list all the things that are officially
  part of the security model.

I was just trying to say that it's unlikely anyone knows 100% of all
security-related things in a system.  Security is a lot like system
robustness, in that many bugs can be exploited to attack a security
model.  Having said that, yes, of course, the intent in articulating a
security model is for it to be as complete as possible.

Marianne


home help back first fref pref prev next nref lref last post