Secure software distribution system
T Bartoletti, LA Dobbs, M Kelley - 1997 - osti.gov
Authenticating and upgrading system software plays a critical role in information security, yet
practical tools for assessing and installing software are lacking in today`s marketplace. The …
practical tools for assessing and installing software are lacking in today`s marketplace. The …
[CITATION][C] Secure Software Distribution
M Rozenblit - Proceedings of NOMS'94-IEEE Network …, 1994 - ieeexplore.ieee.org
Local Exchange Carriers (LECs) have tens of thousands of Network Elements (NEs),
Operation Systems (OSs), and workstations (WSs) that utilize a vast array of software (SW) …
Operation Systems (OSs), and workstations (WSs) that utilize a vast array of software (SW) …
Software distribution transparency and auditability
B Hof, G Carle - arXiv preprint arXiv:1711.07278, 2017 - arxiv.org
A large user base relies on software updates provided through package managers. This
provides a unique lever for improving the security of the software update process. We propose a …
provides a unique lever for improving the security of the software update process. We propose a …
SmartWitness: A proactive software transparency system using smart contracts
… We identify the following several goals that allow us to design a secure software distribution
system. Transparency: A software distribution system should allow stakeholders to be aware …
system. Transparency: A software distribution system should allow stakeholders to be aware …
Scalable, confidential and survivable software updates
F Magnanini, L Ferretti… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… The secure software distribution framework includes nine operations: (1) update authentication,
(2) update validation, and (3) publish are used by the software house members to make …
(2) update validation, and (3) publish are used by the software house members to make …
Secure firmware update: Challenges and solutions
L Catuogno, C Galdi - Cryptography, 2023 - mdpi.com
… and technologies that can be used to build secure software distribution systems. … TMF’s
TA management operations, effectively fulfills the requirements of secure software distribution …
TA management operations, effectively fulfills the requirements of secure software distribution …
A smart card-based secure software distribution scheme for mobile application market
YJ Fan, QY Wen - Proceedings of the 2012 IEEE 16th …, 2012 - ieeexplore.ieee.org
… In this subsection, our secure software distribution scheme for mobile application market
is introduced in detail, which is based on elliptic curve cryptosystem and the security …
is introduced in detail, which is based on elliptic curve cryptosystem and the security …
Artemis: Defanging software supply chain attacks in multi-repository update systems
M Moore, TK Kuppusamy, J Cappos - Proceedings of the 39th Annual …, 2023 - dl.acm.org
… the JDF/Linux Foundation Uptane Standard that secures over-the-air updates for millions
of automobiles, and TUF, which is used by many companies for secure software distribution. …
of automobiles, and TUF, which is used by many companies for secure software distribution. …
Design and Implementation of Secure Software Distribution Mechanism with Campus-wide Authentication and Authorization System at Tokyo Tech
T Shinzato, K Iida, T Uyematsu… - IEICE Technical Report; …, 2008 - ken.ieice.org
(in English) Recently, the importance of software license compliance increases, while its
management cost is usually kept low. In universities it is often the case that software is installed …
management cost is usually kept low. In universities it is often the case that software is installed …
[PDF][PDF] Secure network-enabled commercial airplane operations: It support infrastructure challenges
RV Robinson, K Sampigethaya, M Li… - Proceedings of the …, 2007 - labs.ece.uw.edu
… The top half is a schematic of secure software distribution from suppliers to airplane using
… The bottom half shows high-level protocols for secure software distribution with verification (…
… The bottom half shows high-level protocols for secure software distribution with verification (…