Zhang, 2000 - Google Patents
Java security: Issues and implications for library and archival systemsZhang, 2000
- Document ID
- 7480119848979071957
- Author
- Zhang X
- Publication year
- Publication venue
- Library & archival security
External Links
Snippet
As a computer programming language, Java has advantages over other languages in a number of aspects. For library and archival systems, two advantages of Java are worth noting: Java's capabilities for processing distributed information resources and for providing …
- 241000700605 Viruses 0 description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ousterhout et al. | The safe-tcl security model | |
US6836888B1 (en) | System for reverse sandboxing | |
Viega et al. | Secure programming cookbook for C and C++: recipes for cryptography, authentication, input validation & more | |
US5974549A (en) | Security monitor | |
Oaks | Java security: writing and deploying secure applications | |
US7827613B2 (en) | System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment | |
US7171558B1 (en) | Transparent digital rights management for extendible content viewers | |
EP1325411B1 (en) | Methods of providing java tamperproofing | |
Pistoia et al. | Java 2 network security | |
Jia et al. | " The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing | |
US7734918B2 (en) | Preventing rogue implementations of a security-sensitive class interface | |
Maass et al. | In-nimbo sandboxing | |
Debbabi et al. | Security evaluation of J2ME CLDC embedded Java platform. | |
Safford et al. | A trusted linux client (tlc) | |
Evans | Policy-directed code safety | |
Faupel | Status of Industry Work on Signed Mobile Code | |
Koved et al. | The evolution of Java security | |
Zhang | Java security: Issues and implications for library and archival systems | |
Gritzalis et al. | Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl | |
Klinkoff et al. | Extending. NET security to unmanaged code | |
Zhang et al. | Towards remote policy enforcement for runtime protection of mobile code using trusted computing | |
Skoularidou et al. | Security architectures for network clients | |
Xu et al. | A unified approach for preventing attacks exploiting a range of software vulnerabilities | |
Niinimaki et al. | Java applets and security | |
Iliadis et al. | Towards secure downloadable executable content: The JAVA paradigm |