Detecting malicious java code using virtual machine auditing
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Enhancing Java security with history based access control
Foundations of security analysis and design IV
Hi-index | 0.00 |
Security people are accustomed to asking "What is this person trusted to do?" Java technology started out being concerned primarily with "What is this code trusted to do?" With the rise in distributed Java applications and the use of Java technology in multi-user environments, applications often need to make access control decisions based on who is making a particular request. Java 2 Standard Edition (J2SE™) incorporates multiple access control mechanisms, including user identity based access control. These mechanisms can be used to implement a variety of security models, and can be extended to implement additional requirements.