[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/792770.793694guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

New security architectural directions for Java

Published: 23 February 1997 Publication History

Abstract

The paper gives an overview of the technical direction of Java in terms of the security architecture and desirable features. It also highlights some of the feasibility constraints on the security solutions. The paper assumes that the reader has prior knowledge of Java basics and general security issues. The article is a purely technical discussion for the wider Java community, and does not necessarily commit JavaSoft to any particular features or implementations.

Cited By

View all
  • (2001)An efficient security verification method for programs with stack inspectionProceedings of the 8th ACM conference on Computer and Communications Security10.1145/501983.501994(68-77)Online publication date: 5-Nov-2001
  • (2001)Security verification of programs with stack inspectionProceedings of the sixth ACM symposium on Access control models and technologies10.1145/373256.373260(31-40)Online publication date: 1-May-2001
  • (2000)MAPboxProceedings of the 9th conference on USENIX Security Symposium - Volume 910.5555/1251306.1251307(1-1)Online publication date: 14-Aug-2000
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
COMPCON '97: Proceedings of the 42nd IEEE International Computer Conference
February 1997
ISBN:0818678046

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 February 1997

Author Tags

  1. Java
  2. JavaSoft
  3. feasibility constraints
  4. object oriented programming
  5. object-oriented programming
  6. security architectural directions
  7. security issues
  8. security solutions
  9. technical direction

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2001)An efficient security verification method for programs with stack inspectionProceedings of the 8th ACM conference on Computer and Communications Security10.1145/501983.501994(68-77)Online publication date: 5-Nov-2001
  • (2001)Security verification of programs with stack inspectionProceedings of the sixth ACM symposium on Access control models and technologies10.1145/373256.373260(31-40)Online publication date: 1-May-2001
  • (2000)MAPboxProceedings of the 9th conference on USENIX Security Symposium - Volume 910.5555/1251306.1251307(1-1)Online publication date: 14-Aug-2000
  • (1999)The Ninja jukeboxProceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 210.5555/1251480.1251484(4-4)Online publication date: 11-Oct-1999
  • (1998)Security of web browser scripting languagesProceedings of the 7th conference on USENIX Security Symposium - Volume 710.5555/1267549.1267564(15-15)Online publication date: 26-Jan-1998
  • (1998)Operating system protection for fine-grained programsProceedings of the 7th conference on USENIX Security Symposium - Volume 710.5555/1267549.1267560(11-11)Online publication date: 26-Jan-1998
  • (1998)Security issues surrounding programming languages for mobile codeACM SIGOPS Operating Systems Review10.1145/506133.50613732:2(16-32)Online publication date: 1-Apr-1998
  • (1998)History-based access control for mobile codeProceedings of the 5th ACM conference on Computer and communications security10.1145/288090.288102(38-48)Online publication date: 1-Nov-1998
  • (1997)Extensible security architectures for JavaACM SIGOPS Operating Systems Review10.1145/269005.26666831:5(116-128)Online publication date: 1-Oct-1997
  • (1997)Extensible security architectures for JavaProceedings of the sixteenth ACM symposium on Operating systems principles10.1145/268998.266668(116-128)Online publication date: 1-Oct-1997
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media