This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementation. In addition to verifying type consistency of a given JVM code, the type system statically verifies that the code accesses only those resources that are granted by the prescribed access policy. The type system is proved to be sound with respect to an operational semantics that enforces access control dynamically, similarly to JAVA stack inspection. This result ensures that “well typed code cannot violate access policy. ” The paper then develops a type inference algorithm and shows that it is sound with respect to the type system and that it always infers a mini...
Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) tec...
The language-based approach to security employs programming language technologies to construct secur...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
In a standard Java implementation, a Java program is compiled into Java bytecode, which is then inte...
This paper illustrates how to check access to protected members in the JVM, which is not explained i...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) tec...
The language-based approach to security employs programming language technologies to construct secur...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...
machine level: The Java Virtual Machine (JVM) is a language dependent abstract machine that is close...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
This paper presents an approach to addressing the known weaknesses and security issues of JVM stack ...
In a standard Java implementation, a Java program is compiled into Java bytecode, which is then inte...
This paper illustrates how to check access to protected members in the JVM, which is not explained i...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Capabilities are used to control access to system resources. In modern programming languages that ex...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
AbstractType-based protection mechanisms in a JVM-like environment must be administrated by the code...
Abstract. For decades, secure operating systems have incorporated mandatory access control (MAC) tec...
The language-based approach to security employs programming language technologies to construct secur...
The Java virtual machine and the .NET common language runtime feature an access control mechanism sp...