Sciweavers

386 search results - page 24 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
121
Voted
JCS
2010
122views more  JCS 2010»
15 years 7 days ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
159
Voted
NSPW
1998
ACM
15 years 6 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
CSFW
1995
IEEE
15 years 5 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
IPPS
2006
IEEE
15 years 7 months ago
Babylon v2.0: middleware for distributed, parallel, and mobile Java applications
Babylon v2.0 is a collection of tools and services that provide a 100% Java compatible environment for developing, running and managing parallel, distributed and mobile Java appli...
Willem van Heiningen, Tim Brecht, Steve MacDonald
117
Voted
RTSS
2006
IEEE
15 years 7 months ago
An Emprical Evaluation of Memory Management Alternatives for Real-Time Java
Memory management is a critical issue for correctness and performance of hard-real time systems. Java environments usually incorporate high-throughput garbage collection algorithm...
Filip Pizlo, Jan Vitek