Computational mail as network infrastructure for computer-supported cooperative work
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Tcl and the Tk toolkit
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New security architectural directions for Java
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Flexible control of downloaded executable content
Flexible control of downloaded executable content
Safe Tcl: a toolbox for constructing electronic meeting places
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Providing Fine-grained Access Control for Java Programs
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Secure Composition of Insecure Components
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Secure composition of untrusted code: box π, wrappers, and causality types
Journal of Computer Security - CSFW13
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Explaining non-work-related computing in the workplace: A comparison of alternative models
Information and Management
SoftwarePot: an encapsulated transferable file system for secure software circulation
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Hi-index | 0.00 |
The Web has made it easy for users to download content directly, which not only decreases the software stored on users' machines but lets content providers customize applications by combining different vendors' content. However, this ease and flexibility has a price in terms of security. Content that appears reputable might be malicious; if it is downloaded and given system access it can damage or destroy data on the user's machine as well as the host network. Thus, access to system resources must be controlled. The authors have developed FlexxGuard, a flexible content interpreter that dynamically derives protection domains and uses those domains to authorize content operations.