A stack-based access control mechanism is to prevent untrusted codes from accessing protected resources in distributed application systems, such as Java-centric web applications and Microsoft .NET framework. Such an access control mechanism is enforced at runtime by stack inspection that inspects methods in the current call stack for granted permissions. Nowadays practiced approaches to generating policy files for an application are still manually done by developers based on domain-specific knowledges and testing, due to overwhelming technical challenges involved and engineering efforts in the automation. This paper presents a formal framework of access rights analysis for Java applications, which includes both policy generation and checkin...
CONCLUSION SIGNIFICANCE • Misuse of sensitive resources, such as system files, database files, netwo...
International audienceA model of resource access control is presented in which the access control to...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Access control systems are widely used means for the protection of computing systems. They are defin...
Access control systems are widely used means for the protection of computing systems. They are defin...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
Abstract. The security manager in Java 2 is a runtime access control mechanism. Whenever an access p...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
Defining access control policies for Java applications can be complex. This project investigates me...
A model of resource access control is presented in which the access control to resources can employ ...
This paper presents an access control model for programming applications in which the access control...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
CONCLUSION SIGNIFICANCE • Misuse of sensitive resources, such as system files, database files, netwo...
International audienceA model of resource access control is presented in which the access control to...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
Access control systems are widely used means for the protection of computing systems. They are defin...
Access control systems are widely used means for the protection of computing systems. They are defin...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
Abstract. The security manager in Java 2 is a runtime access control mechanism. Whenever an access p...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
Defining access control policies for Java applications can be complex. This project investigates me...
A model of resource access control is presented in which the access control to resources can employ ...
This paper presents an access control model for programming applications in which the access control...
Application-level security has become an issue in recent years; for example, errors, discrepancies a...
CONCLUSION SIGNIFICANCE • Misuse of sensitive resources, such as system files, database files, netwo...
International audienceA model of resource access control is presented in which the access control to...
Class-based languages, such as Java and C#, implement encapsulation via access modifiers on classes,...