International audienceA model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operational semantics and provide a formal definition of the basic security policy to enforce viz that an application will always ask for a permission before using it to access a resource. A static analysis which enforces the security polic...
Defining access control policies for Java applications can be complex. This project investigates me...
Permission-based security models are common in smartphone operating systems. Such models implement a...
International audienceExtensible Component Platforms support the discovery, in- stallation, starting...
International audienceA model of resource access control is presented in which the access control to...
A model of resource access control is presented in which the access control to resources can employ ...
This paper presents an access control model for programming applications in which the access control...
Abstract. This paper presents an access control model for program-ming applications in which the acc...
The Java Micro Edition platform (JME), a Java enabled technology, provides the Mobile Information De...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
AbstractWe present a Java library for mobile phones which tracks and controls at runtime the use of ...
AbstractPrevention of denial-of-service attacks is indispensable for distributed agent systems to ex...
Current resource policies for mobile phone apps are based on permissions that unconditionally grant...
The growing use of mobile web services such as electronic health records systems and applications li...
The GSM technologies plays vital role in pervasive computing environments. The open and dynamic natu...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
Defining access control policies for Java applications can be complex. This project investigates me...
Permission-based security models are common in smartphone operating systems. Such models implement a...
International audienceExtensible Component Platforms support the discovery, in- stallation, starting...
International audienceA model of resource access control is presented in which the access control to...
A model of resource access control is presented in which the access control to resources can employ ...
This paper presents an access control model for programming applications in which the access control...
Abstract. This paper presents an access control model for program-ming applications in which the acc...
The Java Micro Edition platform (JME), a Java enabled technology, provides the Mobile Information De...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
AbstractWe present a Java library for mobile phones which tracks and controls at runtime the use of ...
AbstractPrevention of denial-of-service attacks is indispensable for distributed agent systems to ex...
Current resource policies for mobile phone apps are based on permissions that unconditionally grant...
The growing use of mobile web services such as electronic health records systems and applications li...
The GSM technologies plays vital role in pervasive computing environments. The open and dynamic natu...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
Defining access control policies for Java applications can be complex. This project investigates me...
Permission-based security models are common in smartphone operating systems. Such models implement a...
International audienceExtensible Component Platforms support the discovery, in- stallation, starting...