[go: up one dir, main page]

Zhang, 2000 - Google Patents

Java security: Issues and implications for library and archival systems

Zhang, 2000

Document ID
7480119848979071957
Author
Zhang X
Publication year
Publication venue
Library & archival security

External Links

Snippet

As a computer programming language, Java has advantages over other languages in a number of aspects. For library and archival systems, two advantages of Java are worth noting: Java's capabilities for processing distributed information resources and for providing …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines

Similar Documents

Publication Publication Date Title
Ousterhout et al. The safe-tcl security model
US6836888B1 (en) System for reverse sandboxing
Viega et al. Secure programming cookbook for C and C++: recipes for cryptography, authentication, input validation & more
US5974549A (en) Security monitor
Oaks Java security: writing and deploying secure applications
US7827613B2 (en) System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment
US7171558B1 (en) Transparent digital rights management for extendible content viewers
EP1325411B1 (en) Methods of providing java tamperproofing
Pistoia et al. Java 2 network security
Jia et al. " The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
US7734918B2 (en) Preventing rogue implementations of a security-sensitive class interface
Maass et al. In-nimbo sandboxing
Debbabi et al. Security evaluation of J2ME CLDC embedded Java platform.
Safford et al. A trusted linux client (tlc)
Evans Policy-directed code safety
Faupel Status of Industry Work on Signed Mobile Code
Koved et al. The evolution of Java security
Zhang Java security: Issues and implications for library and archival systems
Gritzalis et al. Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl
Klinkoff et al. Extending. NET security to unmanaged code
Zhang et al. Towards remote policy enforcement for runtime protection of mobile code using trusted computing
Skoularidou et al. Security architectures for network clients
Xu et al. A unified approach for preventing attacks exploiting a range of software vulnerabilities
Niinimaki et al. Java applets and security
Iliadis et al. Towards secure downloadable executable content: The JAVA paradigm