Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Access Control based on Execution History Martin Abadi
 

Summary: Access Control based on Execution History
Mart´in Abadi
University of California at Santa Cruz
C´edric Fournet
Microsoft Research
Abstract
Security is a major, frequent concern in extensible soft-
ware systems such as Java Virtual Machines and the Com-
mon Language Runtime. These systems aim to enable
simple, classic applets and also, for example, distributed
applications, Web services, and programmable networks,
with appropriate security expectations. Accordingly, they
feature elaborate constructs and mechanisms for associ-
ating rights with code, including a technique for determin-
ing the run-time rights of a piece of code as a function of
the state of the execution stack. These mechanisms pre-
vent many security holes, but they are inherently partial
and they have proved difficult to use reliably.
We motivate and describe a new model for assigning
rights to code: in short, the run-time rights of a piece

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences