Extending Java for package based access control

被引:0
|
作者
Center for Information Security, Department of Computer Science, Keplinger Hall, University of Tulsa, Tulsa [1 ]
OK
74104, United States
机构
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
16th Annual Computer Security Applications Conference, ACSAC 2000
中图分类号
学科分类号
摘要
Access control policies - Authorization - Java - Language translation - Management infrastructure - Object oriented model - Protection - Security services
引用
收藏
页码:67 / 76
相关论文
共 50 条
  • [1] Extending Java']Java for package based access control
    Papa, M
    Bremer, O
    Chandia, R
    Hale, J
    Shenoi, S
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 67 - 76
  • [2] Access Control of Web and Java']Java Based Applications
    Tso, Kam S.
    Pajevski, Michael J.
    Johnson, Bryan
    [J]. 2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, : 320 - 325
  • [3] Analysing the Java']Java package/access concepts in Isabelle/HOL
    Schirmer, N
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (07): : 689 - 706
  • [4] JCCAP: Capability-based access control for Java']Java Card
    Hagimont, D
    Vandewalle, JJ
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 2000, 52 : 365 - 388
  • [5] Role-based access control on the web using Java']Java™
    Giuri, L
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 11 - 18
  • [6] Aspectizing Java']Java Access Control
    Toledo, Rodolfo
    Nunez, Angel
    Tanter, Eric
    Noye, Jacques
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2012, 38 (01) : 101 - 117
  • [7] A distributed access control model for Java']Java
    Molva, R
    Roudier, Y
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 291 - 308
  • [8] Java']Java annotated concurrency based on the concurrent package
    Zhu, Hong
    Yin, Zhaolin
    Ding, Ying
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 38 - +
  • [9] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [10] Extending XACML to support credential based hybrid Access: Control
    Dagdee, Nirmal
    Vijaywargiya, Ruchi
    [J]. International Journal of Computer Science Issues, 2011, 8 (6 6-1): : 204 - 211