With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment its capabilities, there is a growing interest in protection mechanisms that can isolate untrusted software components from a host application. Existing languagebased environments such as the JVM and the CLI achieves software isolation by an interposition mechanism known as stack inspection. Expressive as it is, stack inspection is known to lack declarative characterization and is brittle in the face of evolving software configurations. A run-time module system, ISOMOD, is proposed for the Java platform to facilitate software isolation. A core application may create ...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
The economy-of-scale benefits of multi-tenancy are most compelling at the application level, as this...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
The security of a software system relies on the principle of least privilege,which says that each so...
Abstract — Almost every software system must include a security module to authenticate users and to ...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
CONCLUSION SIGNIFICANCE • Misuse of sensitive resources, such as system files, database files, netwo...
Secure cooperation is the problem of protecting mutually suspicious code units within the same execu...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
The economy-of-scale benefits of multi-tenancy are most compelling at the application level, as this...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The language-based approach to security employs programming language technologies to construct secur...
Software capabilities are a very convenient means to protect co-operating applications. They allow a...
Abstract: Software capabilities are a very convenient means to protect co-operating applications. Th...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
The security of a software system relies on the principle of least privilege,which says that each so...
Abstract — Almost every software system must include a security module to authenticate users and to ...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
CONCLUSION SIGNIFICANCE • Misuse of sensitive resources, such as system files, database files, netwo...
Secure cooperation is the problem of protecting mutually suspicious code units within the same execu...
This paper describes an extension of the Java language that provides “programmable security. ” The a...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
The economy-of-scale benefits of multi-tenancy are most compelling at the application level, as this...