Security policies

Jtrix allows trust relationships to be established with a node operator before code is downloaded to their nodes. The relationship with the node is the most important trust relationship for an application operator to consider, since all other security is dependent on the node's integrity.

Other than that, Jtrix security operates under a mechanism of transitive trust. Trust is established based on certification by a trusted party; certification must be based on verification.

Jtrix ensures that the transitive trust relationship need not be broken, i.e. it need not contain any holes where one party must assume that another is trusted. If verification is correctly performed, the system should be secure to the extent guaranteed by the verification process.



Jim Chapman 2001-08-16