36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
18 °P sammeln
  • Broschiertes Buch

Scientists and engineers are using a distributed application Remote Component Environment (RCE) to design and simulate complex systems such as airplanes, ships and satellites. During the simulation, RCE executes local and remote code with full access to the system resources. Remote code is classified as untrusted code. The execution of remote code comprises potential security risks for the RCE host system. Therefore, isolation techniques are interesting for RCE to restrict the access of resources and reduce the system vulnerability. Different isolation techniques for software systems are…mehr

Produktbeschreibung
Scientists and engineers are using a distributed application Remote Component Environment (RCE) to design and simulate complex systems such as airplanes, ships and satellites. During the simulation, RCE executes local and remote code with full access to the system resources. Remote code is classified as untrusted code. The execution of remote code comprises potential security risks for the RCE host system. Therefore, isolation techniques are interesting for RCE to restrict the access of resources and reduce the system vulnerability. Different isolation techniques for software systems are examined and compared. This is followed by a description of the main features of RCE. A sandbox prototype is implemented and examined whether sandboxing is an effective method to reduce the vulnerability of RCE during the execution of remote code. Existing sandbox models, which are available for implementing the prototype, are analyzed and described and elements of RCE with access to system resource are identified to support the implementation.
Autorenporträt
Marc Julian Stammerjohann was born 1991 in Bensberg. He received his Bachelor of Science degree in Business Information Systems from the Bonn-Rhine-Sieg University of Applied Science 2016 and works since as freelance developer. He prefers developing with Java and is interested in security topics.