Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) techniques. Surprisingly, mobile-code platforms such as the Java Virtual Machine (JVM) and the.NET Common Language Runtime (CLR) have largely ignored these advances and have implemented a far weaker security that does not reliably track ownership and access permissions for indi-vidual data items. We have implemented a system that adds MAC to an exist-ing JVM at the granularity of objects. Our system maintains a strict separation between mechanism and policy, thereby allowing a wide range of policies to be enforced. Moreover, our implementation is independent of any specific JVM, and will work with any JVM that supports the JVM Tools Interface.
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
A model of resource access control is presented in which the access control to resources can employ ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
International audienceThe Java execution environment includes several security mechanisms. They are ...
Reference protection mechanisms, which control the propagation of references, are commonly used to i...
Next generation of Non-volatile Memory(NVM) technologies will change the design of major operating s...
Decentralized Information Flow Control (DIFC) is a promising model for writing programs with powerfu...
In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor,...
Cloud computing, as an emerging computing paradigm, greatly facilitates resource sharing and enables...
Mandatory access control (MAC) is a mechanism by which an operating system provides a secure computi...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
The recent emergence of mandatory access (MAC) enforce-ment for virtual machine monitors (VMMs) pres...
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
A model of resource access control is presented in which the access control to resources can employ ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
International audienceThe Java execution environment includes several security mechanisms. They are ...
Reference protection mechanisms, which control the propagation of references, are commonly used to i...
Next generation of Non-volatile Memory(NVM) technologies will change the design of major operating s...
Decentralized Information Flow Control (DIFC) is a promising model for writing programs with powerfu...
In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor,...
Cloud computing, as an emerging computing paradigm, greatly facilitates resource sharing and enables...
Mandatory access control (MAC) is a mechanism by which an operating system provides a secure computi...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
The recent emergence of mandatory access (MAC) enforce-ment for virtual machine monitors (VMMs) pres...
The ability to enforce usage policies attached to data in a fine grained manner requires that the sy...
A model of resource access control is presented in which the access control to resources can employ ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...