Content deleted Content added
Citation bot (talk | contribs) m Alter: volume. Add: arxiv, hdl, chapter-url, citeseerx, issue. Removed or converted URL. Removed accessdate with no specified URL. Removed parameters. | You can use this bot yourself. Report bugs here. | User-activated. |
Citation bot (talk | contribs) m Removed URL that duplicated unique identifier. Removed parameters. | You can use this bot yourself. Report bugs here.| Activated by User:Corvusphalanx |
||
Line 15:
=== Verifiable choreographies ===
Executable choreographies are a more general concept and are not necessarily verifiable choreographies if they do not use the idea of a site regarded as a security context for code execution. As examples of approaches to programming using executable choreographies, we could list the European project CHOReOS<ref>{{Cite web|url=http://www.choreos.eu|title=ChoreOS|last=|first=|date=|website=|archive-url=|archive-date=|deadurl=|accessdate=}}</ref>, the Chor programming language <ref>{{Cite web|url=http://www.chor-lang.org/|title=Chor Programming Language|last=|first=|date=|website=|archive-url=|archive-date=|deadurl=|accessdate=}}</ref>, the web service modeling in the "Choreographing Web Services" <ref>{{Cite journal|last=Barker|first=Adam|last2=Walton|first2=Christopher D.|last3=Robertson|first3=David|date=2004|title=Choreographing Web Services|journal=IEEE Transactions on Services Computing|volume=2|issue=2|pages=152–166|doi=10.1109/tsc.2009.8|issn=1939-1374
=== Encrypted choreographies ===
Encrypted cryptography supposes that, in addition to verification, they offer higher-level solutions for advanced cryptographic methods without the need for programmers to become cryptography specialists. Distributed applications could be built from subsystems that allow identification or verification of architectural points that expose secret data. For example, ideally, a programming system that uses encrypted choreographs guarantees, or at least helps, minimize situations where a person (legally licensed or hacker) holds both encrypted private data and encryption keys related to the same resources. In this way, the administrators or programmers of these subsystems have fewer possibilities to perform internal attacks on privacy (the level with frequent attacks). Even if some applications can not use this approach, encrypted choreographies can minimize the security risks caused by the people inside who administer or program these systems. Thus, the number of points with discreet access to data (ideally never) is formally ensured. This form of choreography is useful to allow companies to secure by code the application of the legislation or security rules assumed.
The implementation of encrypted choreographies implies, for example, the existence of storage systems using cryptographic techniques with practical implementation of homomorphic encryption, such as the CryptDB <ref>{{Cite book|last=Popa|first=Raluca Ada|last2=Redfield|first2=Catherine M. S.|last3=Zeldovich|first3=Nickolai|last4=Balakrishnan|first4=Hari|date=2011-10-23|title=CryptDB: protecting confidentiality with encrypted query processing
=== Serverless choreographies ===
|