Abstract | ||
---|---|---|
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostile Java applications, it has neglected support for securing "Real World" applications. We suggest that in order to support "Real World" security the ability to insert checks into compiled code in a principled way and high-level abstract security models are required.We briefly review the evolution of the Java Security Model, outline the requirements for supporting "Real World" security for applications, discuss whether Enterprise Java Beans satisfy these requirements, introduce our approach to meeting these requirements and discuss our current work. |
Year | DOI | Venue |
---|---|---|
1999 | 10.1109/FTDCS.1999.818799 | FTDCS |
Keywords | Field | DocType |
real world security models,high-level abstract security model,historical focus,considerable evolution,current work,hostile java application,java security model,real world,enterprise java beans,initial implementation,access control,security,availability,satisfiability,java,reflection,resource management,security model,writing | Permission,Information security standards,Computer science,Computer security,Real time Java,Compiled language,JavaBeans,Access control,Java,Computer security model | Conference |
ISBN | Citations | PageRank |
0-7695-0468-X | 7 | 0.81 |
References | Authors | |
3 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ian S. Welch | 1 | 120 | 18.53 |
Robert Stroud | 2 | 11 | 1.98 |