Building a secure computer system
Building a secure computer system
Sharing and protection in a single-address-space operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Computer related risks
Extensibility safety and performance in the SPIN operating system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Dealing with disaster: surviving misbehaved kernel extensions
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Programming languages for mobile code
ACM Computing Surveys (CSUR)
The security of static typing with dynamic linking
Proceedings of the 4th ACM conference on Computer and communications security
Protection and the control of information sharing in multics
Communications of the ACM
Java Virtual Machine Specification
Java Virtual Machine Specification
The Java Language Specification
The Java Language Specification
Java Security: Present and Near Future
IEEE Micro
IEEE Micro
ACM SIGOPS Operating Systems Review
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Protection in programmed systems.
Protection in programmed systems.
Secure information flow in a multi-threaded imperative language
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
MOCA: a service framework for mobile computing devices
Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Nested Java processes: OS structure for mobile code
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Enforcing trace properties by program transformation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Verifying object initialization in the Java bytecode language
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 2
Towards a secure platform for distributed mobile object computing
ACM SIGOPS Operating Systems Review
Static enforcement of security with types
ICFP '00 Proceedings of the fifth ACM SIGPLAN international conference on Functional programming
A secure execution framework for Java
Proceedings of the 7th ACM conference on Computer and communications security
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Security verification of programs with stack inspection
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Access control in configurable systems
Secure Internet programming
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
Security issues surrounding programming languages for mobile code: JAVA vs. Safe-Tcl
ACM SIGOPS Operating Systems Review
Secure calling contexts for stack inspection
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming
Access rights analysis for Java
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
IEEE Internet Computing
Securing Systems Against External Programs
IEEE Internet Computing
IEEE Internet Computing
IEEE Internet Computing
Computer
Secure Information Flow as Typed Process Behaviour
ESOP '00 Proceedings of the 9th European Symposium on Programming Languages and Systems
Trustless Grid Computing in ConCert
GRID '02 Proceedings of the Third International Workshop on Grid Computing
Realization of an Agent-Based Certificate Authority and Key Distribution
IATA '99 Proceedings of the Third International Workshop on Intelligent Agents for Telecommunication Applications
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Providing Fine-grained Access Control for Java Programs
ECOOP '99 Proceedings of the 13th European Conference on Object-Oriented Programming
Runtime Support for Type-Safe Dynamic Java Classes
ECOOP '00 Proceedings of the 14th European Conference on Object-Oriented Programming
Dynamic Configuration and Enforcement of Access Control for Mobile Components
NGIT '99 Proceedings of the 4th International Workshop on Next Generation Information Technologies and Systems
A Flexible Containment Mechanism for Executing Untrusted Code
Proceedings of the 11th USENIX Security Symposium
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Towards Secure Downloadable Executable Content: The Java Paradigm
SAFECOMP '98 Proceedings of the 17th International Conference on Computer Safety, Reliability and Security
Language Issues in Mobile Program Security
Mobile Agents and Security
Signing, Sealing, and Guarding Java Objects
Mobile Agents and Security
Personal trusted devices for web services: revisiting multilevel security
Mobile Networks and Applications - Security in mobile computing environments
Empowering mobile code using expressive security policies
Proceedings of the 2002 workshop on New security paradigms
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Journal of Computer Security - IFIP 2000
Policies in Accountable Contracts
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
Model-carrying code: a practical approach for safe execution of untrusted applications
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Grid-computing portals and security issues
Journal of Parallel and Distributed Computing - Scalable web services and architecture
SELF: a transparent security extension for ELF binaries
Proceedings of the 2003 workshop on New security paradigms
GridBox: securing hosts from malicious and greedy applications
MGC '04 Proceedings of the 2nd workshop on Middleware for grid computing
A Self-Organizing Flock of Condors
Proceedings of the 2003 ACM/IEEE conference on Supercomputing
An Approach for Secure Software Installation
LISA '02 Proceedings of the 16th USENIX conference on System administration
Interfaces for stack inspection
Journal of Functional Programming
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Formal specification and analysis of JAAS framework
Proceedings of the 2006 international workshop on Software engineering for secure systems
A self-organizing flock of Condors
Journal of Parallel and Distributed Computing
Policy-driven reflective enforcement of security policies
Proceedings of the 2006 ACM symposium on Applied computing
Fractal: a mobile code-based framework for dynamic application protocol adaptation
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
ROST: Remote and hot service deployment with trustworthiness in CROWN Grid
Future Generation Computer Systems
Preventing privilege escalation
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Techniques for the design of java operating systems
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Type safe dynamic linking for JVM access control
Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming
Security: important issue in e-commerce
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Types and trace effects of higher order programs
Journal of Functional Programming
CMV: automatic verification of complete mediation for java virtual machines
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Towards Trust Services for Language-Based Virtual Machines for Grid Computing
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Types and trace effects for object orientation
Higher-Order and Symbolic Computation
Reusability of Functionality-Based Application Confinement Policy Abstractions
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Proceedings of the 2nd Workshop on Virtual Machines and Intermediate Languages for emerging modularization mechanisms
Security benchmarks of OSGi platforms: toward Hardened OSGi
Software—Practice & Experience
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Euro-Par 2008 Workshops - Parallel Processing
Modular string-sensitive permission analysis with demand-driven precision
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Dynamic Malicious Code Detection Based on Binary Translator
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A Type and Effect System for Flexible Abstract Interpretation of Java
Electronic Notes in Theoretical Computer Science (ENTCS)
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
Component-based access control: secure software composition through static analysis
SC'08 Proceedings of the 7th international conference on Software composition
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests
ACM SIGOPS Operating Systems Review
Capsicum: practical capabilities for UNIX
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Towards architecture-level middleware-enabled exception handling of component-based systems
Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering
HBAC: a model for history-based access control and its model checking
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
A feather-weight application isolation model
INTRUST'09 Proceedings of the First international conference on Trusted Systems
On object initialization in the Java bytecode
Computer Communications
Dynamic information flow control architecture for web applications
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An HBAC-based approximation for IBAC programs
Proceedings of the 6th International Conference on Security of Information and Networks
Using AOP-based enforcement of prioritised XACML policies for location privacy
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
This paper describes the new security architecture that has been implemented aspart of JDK1.2, the forthcoming JavaTM Development Kit. In going beyond the sandbox security model in the original release of Java, JDK1.2 provides fine-grained access control via an easily configurable security policy. Moreover, JDK1.2 introduces the concept of protection domain and a few related security primitives that help to make the underlying protection mechanism more robust.