Gong et al., 1997 - Google Patents
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2Gong et al., 1997
View PDF- Document ID
- 12405059670787866485
- Author
- Gong L
- Mueller M
- Prafullchandra H
- Schemers R
- Publication year
- Publication venue
- USENIX Symposium on Internet Technologies and Systems (USITS 97)
External Links
Snippet
This paper describes the new security architecture that has been implemented as part of JDK1. 2, the forthcoming Java Development Kit. In going beyond the sandbox security model in the original release of Java, JDK1. 2 provides fine-grained access control via an …
- 240000007419 Hura crepitans 0 title abstract description 11
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gong et al. | Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2 | |
| Wallach et al. | Extensible security architectures for Java | |
| Jaeger | Operating system security | |
| Gong et al. | Implementing Protection Domains in the JavaTM Development Kit 1.2. | |
| Gong | Java security architecture (JDK 1.2) | |
| Malkhi et al. | Secure execution of Java applets using a remote playground | |
| Gong | Java 2 platform security architecture | |
| EP0953172B1 (en) | Protecting resources in a distributed computer system | |
| Gong | Secure Java class loading | |
| Balfanz et al. | Experience with secure multi-processing in Java | |
| AU2004203375A1 (en) | Delegated administration of a hosted resource | |
| Butt et al. | Grid-computing portals and security issues | |
| Dean et al. | Java security: Web browsers and beyond | |
| Levy et al. | The Safe-Tcl Security Model. | |
| Cappos et al. | Retaining sandbox containment despite bugs in privileged memory-safe code | |
| Anupam et al. | Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. | |
| Butt et al. | Fine-grain access control for securing shared resources in computational grids | |
| US20030084324A1 (en) | Method and apparatus for type independent permission based access control | |
| JP2000207363A (en) | User access controller | |
| Grimm et al. | Providing policy-neutral and transparent access control in extensible systems | |
| Hauswirth et al. | A secure execution framework for Java | |
| Bauer et al. | Mechanisms for secure modular programming in Java | |
| Sterbenz | An evaluation of the java security model | |
| Koved et al. | The evolution of Java security | |
| Pandey et al. | Providing fine‐grained access control for Java programs via binary editing |