Secure cooperation is the problem of protecting mutually suspicious code units within the same execution environment from their potentially malicious peers. A statically enforceable capability type system is proposed for the JVM bytecode language to provide fine-grained access control of shared resources among peer code units. The design of the type system is inspired by recent advances in alias control type systems for object-oriented programming languages. The exercise of access rights and the propagation of capabilities are given a uniform interpretation as alias creation events. Each capability type assigns to a reference a dataflow trajectory, prescribing the set of aliases that is allowed to be created from the reference. An orthogona...
The proliferation of shared mutable state in object-orientedprogramming complicates software develop...
This thesis presents a general model of access control. It uses a simple notion of an access permiss...
Motivated by the problem of understanding the difference between practical access control and capabi...
The language-based approach to security employs programming language technologies to construct secur...
Object-oriented programming languages allow inter-object aliasing. Although necessary to construct l...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Abstract—In capability-safe languages, components can access a resource only if they possess a capab...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Capabilities are used to control access to system resources. In modern programming languages that ex...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Interobject references in object-oriented programs allow arbitrary aliases between objects. By breac...
The use of shared mutable state, commonly seen in object-oriented systems, is often problematic due ...
KAPPA is a type system for safe concurrent object-oriented program- ming using reference capabilitie...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
The proliferation of shared mutable state in object-orientedprogramming complicates software develop...
This thesis presents a general model of access control. It uses a simple notion of an access permiss...
Motivated by the problem of understanding the difference between practical access control and capabi...
The language-based approach to security employs programming language technologies to construct secur...
Object-oriented programming languages allow inter-object aliasing. Although necessary to construct l...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
Abstract—In capability-safe languages, components can access a resource only if they possess a capab...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Capabilities are used to control access to system resources. In modern programming languages that ex...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Interobject references in object-oriented programs allow arbitrary aliases between objects. By breac...
The use of shared mutable state, commonly seen in object-oriented systems, is often problematic due ...
KAPPA is a type system for safe concurrent object-oriented program- ming using reference capabilitie...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
The proliferation of shared mutable state in object-orientedprogramming complicates software develop...
This thesis presents a general model of access control. It uses a simple notion of an access permiss...
Motivated by the problem of understanding the difference between practical access control and capabi...