Capabilities as alias control: Secure cooperation in dynamically extensible systems (2004)

by Philip W. L. Fong , Cheng Zhang
Venue:DEPARTMENT OF COMPUTER SCIENCE, UNIVERSITY OF REGINA
Citations:9 - 3 self

Active Bibliography

9 Proof Linking: A Modular Verification Architecture for Mobile Code Systems – Philip W. L. Fong - 2004
13 Pluggable Verification Modules: An Extensible Protection Mechanism for the JVM – Philip W.L. Fong - 2003
52 Access control by tracking shallow execution history – Philip W. L. Fong - 2004
123 Ownership Domains: Separating Aliasing Policy from Mechanism – Jonathan Aldrich, Craig Chambers - 2004
2 Simple Loose Ownership Domains – Jan Schäfer, Arnd Poetzsch-heffter - 2006
2 A Parameterized Type System for Simple Loose Ownership Domains – Jan Schäfer , Arnd Poetzsch-Heffter - 2002
Software ENgineering Minimal ownership for active objects – D. G. Clarke, T. Wrigstad, J. Östlund, E. B. Johnsen
100 Encapsulating Objects with Confined Types – Christian Grothoff, Jens Palsberg, Jan Vitek - 2001
31 Saving the World from Bad Beans: Deployment-Time Confinement Checking – Dave Clarke, Michael Richmond, James Noble - 2003
5 SECURITY POLICY ENFORCEMENT BY AUTOMATED PROGRAM-REWRITING – Kevin W. Hamlen - 2006
2 Link-Time Enforcement of Confined Types for JVM Bytecode – Philip W. L. Fong - 2005
15 Capabilities for Uniqueness and Borrowing – Martin Odersky
Separating Access Control Policy, – Enforcement And Functionality, Robert Grimm, Brian N. Bershad - 2001
91 A Language-Based Approach to Security – Fred B. Schneider, Greg Morrisett, Robert Harper - 2000
1 Language-Based Security for Malicious Mobile Code – Fred B. Schneider, Dexter Kozen, Greg Morrisett, Andrew C. Myers
28 Language-Based Security – Dexter Kozen - 1999
25 Run-time Enforcement of Nonsafety Policies – Jay Ligatti, Lujo Bauer, David Walker
27 Enforcing non-safety security policies with program monitors – Jay Ligatti - 2005
Abstract Formalizing Composite State Encapsulation – Adrian Fiech