Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other
copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying
this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without
the explicit permission of the copyright holder.
show main publications
Securing Java with Local Policies @INPROCEEDINGS{BCDFMZ, title = {{Securing Java with Local Policies}}, author = {{Massimo} {Bartoletti} and {Gabriele} {Costa} and {Pierpaolo} {Degano} and {Gianluigi} {Ferrari} and {Fabio} {Martinelli} and {Roberto} {Zunino}}, booktitle = {Proceedings of the 10th Workshop on Formal Techniques for Java-like Programs (FTfJP 2008). July 8th, 2008. Paphos (Cyprus)}, abstract = {We propose an extension to the security model of Java. It allows for specifying, analysing and enforcing history-based policies. Policies are defined by finite state automata recognizing the permitted execution histories. Programmers can sandbox an untrusted piece of code with a policy, which is enforced at run-time through its local scope. A static analysis allows for optimizing the execution monitor, that will only check the program points where some security violation may actually occur.}, number = {ICIS-R0801}, year = {2008}, url = {http://www.di.unipi.it/%7Ebartolet/pubs/securing-java-ftfjp08.pdf}, address = {Nijmegen}, institution = {Radboud University}, keywords = {security policies}, partner = {PISA, UNITN}, status = {public}, task = {T3.1}, }
|