Two implementations are given for Java's stack-inspection access-control policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different formulation of the policy. Performance of the implementations is evaluated, and one is found to be competitive with Java's less-flexible, JVM-resident implementation. The exercise illustrates the power of the IRM approach for enforcing security policies
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation ...
Two implementations are given for Java’s stack-inspection access-control policy. Each implementation...
Embedding security enforcement code into applications is an alternative to traditional security mec...
Embedding security enforcement code into applications is an alternative to tradi-tional security mec...
Inline reference monitoring is a powerful technique to enforce security policies on untrusted progra...
Inline reference monitoring is a powerful technique to enforce secu-rity policies on untrusted progr...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
Abstract. A technique for elegantly expressing In-lined Reference Mon-itor (IRM) certification as mo...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
International audienceThe Java execution environment includes several security mechanisms. They are ...
© 2014 Cambridge University Press. Security monitor inlining is a technique for security policy enfo...
We propose an extension to the security model of Java, that allows for specifying, analysing and enf...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation ...
Two implementations are given for Java’s stack-inspection access-control policy. Each implementation...
Embedding security enforcement code into applications is an alternative to traditional security mec...
Embedding security enforcement code into applications is an alternative to tradi-tional security mec...
Inline reference monitoring is a powerful technique to enforce security policies on untrusted progra...
Inline reference monitoring is a powerful technique to enforce secu-rity policies on untrusted progr...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
Abstract. A technique for elegantly expressing In-lined Reference Mon-itor (IRM) certification as mo...
Current implementations of Java make security decisions by searching the runtime call stack. These s...
International audienceThe Java execution environment includes several security mechanisms. They are ...
© 2014 Cambridge University Press. Security monitor inlining is a technique for security policy enfo...
We propose an extension to the security model of Java, that allows for specifying, analysing and enf...
The paper focuses on stack inspection, the access control mechanism implemented in Java and the CLR...
A stack-based access control mechanism is to prevent untrusted codes from accessing protected resour...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...