[go: up one dir, main page]

Gong et al., 1997 - Google Patents

Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2

Gong et al., 1997

View PDF
Document ID
12405059670787866485
Author
Gong L
Mueller M
Prafullchandra H
Schemers R
Publication year
Publication venue
USENIX Symposium on Internet Technologies and Systems (USITS 97)

External Links

Snippet

This paper describes the new security architecture that has been implemented as part of JDK1. 2, the forthcoming Java Development Kit. In going beyond the sandbox security model in the original release of Java, JDK1. 2 provides fine-grained access control via an …
Continue reading at www.usenix.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Gong et al. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
Wallach et al. Extensible security architectures for Java
Jaeger Operating system security
Gong et al. Implementing Protection Domains in the JavaTM Development Kit 1.2.
Gong Java security architecture (JDK 1.2)
Malkhi et al. Secure execution of Java applets using a remote playground
Gong Java 2 platform security architecture
EP0953172B1 (en) Protecting resources in a distributed computer system
Gong Secure Java class loading
Balfanz et al. Experience with secure multi-processing in Java
AU2004203375A1 (en) Delegated administration of a hosted resource
Butt et al. Grid-computing portals and security issues
Dean et al. Java security: Web browsers and beyond
Levy et al. The Safe-Tcl Security Model.
Cappos et al. Retaining sandbox containment despite bugs in privileged memory-safe code
Anupam et al. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies.
Butt et al. Fine-grain access control for securing shared resources in computational grids
US20030084324A1 (en) Method and apparatus for type independent permission based access control
JP2000207363A (en) User access controller
Grimm et al. Providing policy-neutral and transparent access control in extensible systems
Hauswirth et al. A secure execution framework for Java
Bauer et al. Mechanisms for secure modular programming in Java
Sterbenz An evaluation of the java security model
Koved et al. The evolution of Java security
Pandey et al. Providing fine‐grained access control for Java programs via binary editing