As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, many of the security concerns historically solved by hardware enforced protection domains are again sneaking their way into code. Previous schemes to enforce protection domains within the Java language have accepted run-time overhead and severe limitations on sharing semantics as a reasonable cost to achieve security. This thesis proposes soft boundaries to attain the benefits of separation without additional run-time overhead and without compromising the Java semantics. Soft boundaries use static analysis to assist the programmer in isolating components, protecting both a program's data and its control flow. Soft boundaries can be deployed ei...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
We propose an extension to the security model of Java, that allows for specifying, analysing and en...
Abstract Several authors have proposed using code modification as a technique for enforcing security...
Safe language technology can be used for protection within a single address space. This protection i...
Safe language technology can be used for protection within a single address space. This protection i...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
Process-based separation has long been the prevalent model for providing security and isolation to p...
JAVASEAL extends the JAVA programming environment with a model of mobile "agents" and strong hierarc...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
It is essential for security to be able to isolate mistrusting programs from one another, and to pro...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Language runtime systems are increasingly being embedded in systems to support runtime extensibility...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
We propose an extension to the security model of Java, that allows for specifying, analysing and en...
Abstract Several authors have proposed using code modification as a technique for enforcing security...
Safe language technology can be used for protection within a single address space. This protection i...
Safe language technology can be used for protection within a single address space. This protection i...
Security policies stipulate restrictions on the behaviors of systems to prevent themfrom behaving in...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
Process-based separation has long been the prevalent model for providing security and isolation to p...
JAVASEAL extends the JAVA programming environment with a model of mobile "agents" and strong hierarc...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
Abstract. Safe language technology can be used for protection within a single address space. This pr...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
It is essential for security to be able to isolate mistrusting programs from one another, and to pro...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
Language runtime systems are increasingly being embedded in systems to support runtime extensibility...
Reference protection mechanisms are commonly used to isolate and to provide protection for component...
We propose an extension to the security model of Java, that allows for specifying, analysing and en...
Abstract Several authors have proposed using code modification as a technique for enforcing security...