Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
History-based access control for mobile code
Secure Internet programming
An efficient security verification method for programs with stack inspection
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl
ACM SIGOPS Operating Systems Review
A Flexible Security System for Using Internet Content
IEEE Software
IEEE Internet Computing
Towards Secure Downloadable Executable Content: The Java Paradigm
SAFECOMP '98 Proceedings of the 17th International Conference on Computer Safety, Reliability and Security
Mobile Agents and Security
MAPbox: using parameterized behavior classes to confine untrusted applications
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Security of web browser scripting languages: vulnerabilities, attacks, and remedies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A mobile-based marketing information management system
CBMS'03 Proceedings of the 16th IEEE conference on Computer-based medical systems
Optimal assignment of mobile agents for software authorization and protection
Computer Communications
Hi-index | 0.00 |
The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowledge of Java basics and general security issues. The article is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.