Sciweavers

183 search results - page 13 / 37
» Certificates for mobile code security
Sort
View
JLP
2010
142views more  JLP 2010»
14 years 11 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
CCS
2007
ACM
15 years 10 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
CONCUR
2009
Springer
15 years 10 months ago
Flow Policy Awareness for Distributed Mobile Code
Several programming constructs have recently been proposed with the purpose of enabling the programmer to encode declassifying information flows within a program that complies wi...
Ana Almeida Matos
CSFW
2000
IEEE
15 years 7 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
SMARTNET
2000
15 years 5 months ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun