International audienceExtensible Component Platforms support the discovery, in- stallation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-constraint devices, they have both strong performance and security requirements. The current security model for Java systems, Permissions, are based on call stack analysis. They proves to be very time-consuming, which makes them difficult to use in production environments. We therefore define the Component-Based Access Control (CBAC) Se- curity Model, which aims at emulating Java Permissions through static analysis at the installation phase of the components. CBAC is based on a fully declarative approach, that makes it possible to tag arbitrary meth- o...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
Abstract. When dealing with dynamic component environments such as the OSGi Service Platform, where ...
Abstract. Extensible Component Platforms support the discovery, in-stallation, starting, uninstallat...
Security in component-based software applications is studied by looking at information leakage from ...
This paper presents an access control model for programming applications in which the access control...
Defining access control policies for Java applications can be complex. This project investigates me...
International audienceA model of resource access control is presented in which the access control to...
In this paper we study security in component-based software applications by looking at information l...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract — Almost every software system must include a security module to authenticate users and to ...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
Permission-based security models are common in smartphone operating systems. Such models implement a...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
Abstract. When dealing with dynamic component environments such as the OSGi Service Platform, where ...
Abstract. Extensible Component Platforms support the discovery, in-stallation, starting, uninstallat...
Security in component-based software applications is studied by looking at information leakage from ...
This paper presents an access control model for programming applications in which the access control...
Defining access control policies for Java applications can be complex. This project investigates me...
International audienceA model of resource access control is presented in which the access control to...
In this paper we study security in component-based software applications by looking at information l...
Doctor en Ciencias, Mención ComputaciónIt is inevitable that some concerns crosscut a sizable applic...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
Abstract — Almost every software system must include a security module to authenticate users and to ...
We have to face a simple, yet, disturbing fact: current computing is inherently insecure. The system...
Permission-based security models are common in smartphone operating systems. Such models implement a...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
Abstract. When dealing with dynamic component environments such as the OSGi Service Platform, where ...