Kava - A Reflective Java Based on Bytecode Rewriting
Proceedings of the 1st OOPSLA Workshop on Reflection and Software Engineering: Reflection and Software Engineering, Papers from OORaSE 1999
Using reflection as a mechanism for enforcing security policies on compiled code
Journal of Computer Security - Special issue on ESORICS 2000
Protecting Java component integrity against Trojan Horse programs
Integrity and internal control in information systems V
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
Electronic Commerce Research
Hi-index | 0.00 |
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing "Real World" applications. We suggest that in order to support "Real World" security the ability to insert checks into compiled code in a principled way and high-level abstract security models are required.We briefly review the evolution of the Java Security Model, outline the requirements for supporting "Real World" security for applications, discuss whether Enterprise Java Beans satisfy these requirements, introduce our approach to meeting these requirements and discuss our current work.