Integrity, Authentication, Privacy, and Delegation: Security Goals in Automated Software Connguration Management over the Internet

Michael Gertz,S. Stubblebine
Abstract:Installation, connguration, and administration of desktop software is a non-trivial process. Even a simple application can have numerous dependencies to hardware, device drivers, operating system versions, dynamically linked libraries, and even to other applications. There are other complications including local customization, timely an-nunciation of new release availability, timely annunciation constraints on valid conng-urations, protecting the privacy of conngurations, authentication of licenses, authen-tication and delegation of connguration authority, and demarkation of administrative boundaries. These problems have not been completely considered in existing systems and in the literature. We illustrate these problems using a scenario and describe our research programme in this area. 1 Background Traditionally, the installation of software was simple: an administrator received a tape, unbundled the software oo the tape, created a few initialization and proole les, and the software was oo and running. Later releases for the software arrive likewise in magnetic media and handled similarly. With component-based distributed software running on a networked computer, the process is simpler in some ways and more complex in others. Rather than using This is a terribly, horribly, pathetically rough draft. Please, please don't circulate it.
What problem does this paper attempt to address?