Reference protection mechanisms are commonly used to isolate and to provide protection for components that execute within a shared run-time environment. These mechanisms often incur an overhead due to maintaining the isolation or introduce inefficiencies in the communication between the components. Past research operated under the assumption that some performance loss is an acceptable price for the added security that comes with better isolation. This thesis sets out to demonstrate that good isolation does not imply performance loss. While numerous models for implementing reference protection have been suggested, there is a lack of a unified terminology that allows the comparison of systems from across the domain. This thesis presents a cla...
The goal of this project is first of all to do an exhaustive study for all available technologies fo...
As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, m...
With the recent advent of dynamically extensible software systems, in which software extensions may ...
Reference protection mechanisms, which control the propagation of references, are commonly used to i...
To date, systems offering multitasking for the Java™ programming language either use one process or ...
In this paper, we focus on concurrent programs that use locks to achieve isolation of data accessed ...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The goal of this project is first of all to do an exhaustive study for all available technologies fo...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
The OSGi framework is a Java-based, centralized, com-ponent oriented platform. It is being widely ad...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
The goal of this project is first of all to do an exhaustive study for all available technologies fo...
As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, m...
With the recent advent of dynamically extensible software systems, in which software extensions may ...
Reference protection mechanisms, which control the propagation of references, are commonly used to i...
To date, systems offering multitasking for the Java™ programming language either use one process or ...
In this paper, we focus on concurrent programs that use locks to achieve isolation of data accessed ...
Sharing and transfer of references is difficult to control in object-oriented languages. As informat...
Abstract Confined types enforce a form of encapsulation stronger than what the standard Java typesys...
The goal of this project is first of all to do an exhaustive study for all available technologies fo...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
In this thesis we study state isolation and efficient message-passing in the context of concurrent o...
A fully abstract compilation scheme prevents the security features of the high-level language from b...
The OSGi framework is a Java-based, centralized, com-ponent oriented platform. It is being widely ad...
Process-based separation has long been the prevalent model for providing security and isolation to p...
Because large, complex systems inevitably contain se-curity vulnerabilities, it is important to miti...
The goal of this project is first of all to do an exhaustive study for all available technologies fo...
As safe languages, such as Java, find themselves leveraged to run larger, multi-task applications, m...
With the recent advent of dynamically extensible software systems, in which software extensions may ...