The original publication is available at www.springerlink.comJava is one of the most famous mobile code systems, and its components can be dynamically downloaded from the other computers over the internet. Because such downloaded components are not always reliable, behaviors of each component are restricted according to the application’s policy. However, it is not so easy for the application users or developers to decide the suitable policy. In this paper, we introduce a tool for generating and checking the security policies for Java application. As we deploy Java components spatially on a window of our tool, we can check which component can be executed or not with respect to a set of security policies. In addition, our tool can generate th...
With the large number of mobile applications being developed and used, the mobile application securi...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
QSIC 2006, Beijing, China, Oct. 2006Users and providers of an information system should clearly unde...
Users and providers of an information system should clearly understand the threats caused by the sys...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
We propose a method for analyzing trade-off between security polices for Java mobile codes and requi...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
This dissertation presents a novel security architecture called security-passing style and motivates...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
With the large number of mobile applications being developed and used, the mobile application securi...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
QSIC 2006, Beijing, China, Oct. 2006Users and providers of an information system should clearly unde...
Users and providers of an information system should clearly understand the threats caused by the sys...
Java is a popular programming language designed by Sun Microsystems and used for desktop application...
We propose a method for analyzing trade-off between security polices for Java mobile codes and requi...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
This dissertation presents a novel security architecture called security-passing style and motivates...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
Abstract: The contemporary approach to enrich the functionality of various devices is to make them p...
With the large number of mobile applications being developed and used, the mobile application securi...
Language-based security provides a means to enforce end-to-end condentiality and integrity policies ...
We propose a method for analyzing trade-off between an environment where a Java mobile code applicat...