sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view that mobile code is inherently risky, and hence focus on confining it. Such confinement is usually achieved using access control policies that restrict mobile code from taking any action that can potentially be used to harm the host system. While such policies can be helpful in keeping "bad applets " in check, they pre-clude a large number of useful applets. We therefore take an alter-native view of mobile code security, one that is focused on empow-ering mobile code rather than disabling it. We propose an approach wherein highly expressive security policies provide the basis for such empowerment, while greatly mitigating the risks...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
International audienceMobile programs, like applets, are not only ubiquitous but also potentially ma...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Mobile programs, like applets, are not only ubiquitous but also potentially malicious. We study the ...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Abstract Several authors have proposed using code modification as a technique for enforcing security...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This dissertation presents a novel security architecture called security-passing style and motivates...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
International audienceMobile programs, like applets, are not only ubiquitous but also potentially ma...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Mobile programs, like applets, are not only ubiquitous but also potentially malicious. We study the ...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Abstract Several authors have proposed using code modification as a technique for enforcing security...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
Abstract: A mobile code application can be easily integrated by using existing software components, ...