Extensible Security Architecture for Java

@inproceedings{Wallach1997ExtensibleSA,
  title={Extensible Security Architecture for Java},
  author={Dan S. Wallach and Dirk Balfanz and Drew Dean and Edward W. Felten},
  booktitle={SOSP},
  year={1997}
}
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit all programs to a single restrictive security policy. However, software-based protection can allow for more extensible security models, with potentially significant performance improvements over traditional hardware-based solutions. An extensible security system should be able to protect subsystems and implement policies that are created after the initial system is shipped. We describe and analyze three… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 44 CITATIONS

Transitiver Schutz in Java durch Sicherheitsmetaobjekte

VIEW 13 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Inferring Java Security Policies Through Dynamic Sandboxing

VIEW 3 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Supporting reconfigurable security policies for mobile programs

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Mobile Code Security

  • IEEE Internet Computing
  • 1998
VIEW 2 EXCERPTS
HIGHLY INFLUENCED

Isolating untrusted software extensions by custom scoping rules

  • Computer Languages, Systems & Structures
  • 2010
VIEW 1 EXCERPT
CITES METHODS

Issues about Java Operating System

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND

A Module System for Isolating Untrusted Software Extensions

  • 2006 22nd Annual Computer Security Applications Conference (ACSAC'06)
  • 2006
VIEW 1 EXCERPT
CITES METHODS