• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Extensible Security Architectures for Java. (1997)

by D Wallach
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 199
Next 10 →

Secure information flow in a multi-threaded imperative language

by Geoffrey Smith, Dennis Volpano - IN PROC. ACM SYMP. ON PRINCIPLES OF PROGRAMMING LANGUAGES , 1998
"... Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either high or low security; intuitively, we wish to prevent information from flowing from high variables to low variables. Here, we ..."
Abstract - Cited by 239 (8 self) - Add to MetaCart
Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either high or low security; intuitively, we wish to prevent information from flowing from high variables to low variables. Here, we extend the analysis to deal with a multithreaded language. We show that the previous type system is insufficient to ensure a desirable security property called noninterference. Noninterference basically means that the final values of low variables are independent of the initial values of high variables. By modifying the sequential type system, we are able to guarantee noninterference for concurrent programs. Crucial to this result, however, is the use of purely nondeterministic thread scheduling. Since implementing such scheduling is problematic, we also show how a more restrictive type system can guarantee noninterference, given a more deterministic (and easily implementable) scheduling policy, such as round-robin time slicing. Finally, we consider the consequences of adding a clock to the language.

EROS: a fast capability system

by Jonathan S. Shapiro, Jonathan M. Smith, David J. Farber - In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP’99), pages 170–185, Kiawah Island Resort , 1999
"... EROS is a capability-based operating system for commodity processors which uses a single level storage model. The single level store's persistence is transparent to applications. The performance consequences of support for transparent persistence and capability-based architectures are generally ..."
Abstract - Cited by 236 (29 self) - Add to MetaCart
EROS is a capability-based operating system for commodity processors which uses a single level storage model. The single level store's persistence is transparent to applications. The performance consequences of support for transparent persistence and capability-based architectures are generally believed to be negative. Surprisingly, the basic operations of EROS (such as IPC) are generally comparable in cost to similar operations in conventional systems. This is demonstrated with a set of microbenchmark measurements of semantically similar operations in Linux. The EROS system achieves its performance by coupling well-chosen abstract objects with caching techniques for those objects. The objects (processes, nodes, and pages) are well-supported by conventional hardware, reducing the overhead of capabilities. Software-managed caching techniques for these objects reduce the cost of persistence. The resulting performance suggests that composing protected subsystems may be less costly than commonly believed. 1
(Show Context)

Citation Context

...ated into distinct protected subsystems to provide both fault isolation and discretionary access control. Languagebased approaches to enforcing protected subsystems have proven difficult to implement =-=[54]-=-, and require expensive conversion of existing applications to the new language. An OS-based solution, possibly augmented by language level mechanisms, is therefore preferable. However, the desirable ...

Mobile Computing with the Rover Toolkit”,

by A D Joseph, J A Tauber, M F Kaashoek - IEEE Transactions on Computers: Special issue on Mobile Computing, , 1997
"... ..."
Abstract - Cited by 176 (3 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...environments. However, there are several safety issues relating to the general use of mobile code that are not addressed by the current architecture. These issues represent an area of active research =-=[83]-=- beyond the scope of this thesis. 54sCallback GUI Request Stable Queue Rover Client Scheduler Request Reply Filesystem / Object Repository Stable Queue Rover Server Figure 3-3: The components of Queue...

The Flask Security Architecture: System Support for Diverse Security Policies

by Ray Spencer, Secure Computing Corporation, Stephen Smalley, Peter Loscocco, National Security Agency, Mike Hibler David Andersen - in Proceedings of The Eighth USENIX Security Symposium , 1999
"... Operating systems must be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide variety of real-world security policies. Such flexibility requires controlling the propagation of access rights, enforcing fine-grained access rights and supporting the ..."
Abstract - Cited by 170 (10 self) - Add to MetaCart
Operating systems must be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide variety of real-world security policies. Such flexibility requires controlling the propagation of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted access rights. Previous systems are lacking in at least one of these areas. In this paper we present an operating system security architecture that solves these problems. Control over propagation is provided by ensuring that the security policy is consulted for every security decision. This control is achieved without significant performance degradation through the use of a security decision caching mechanism that ensures a consistent view of policy decisions. Both fine-grained access rights and revocation support are provided by mechanisms that are directly integrated into the service-providing components of the system. The architecture is described through its prototype implementation in the Flask microkernelbased operating system, and the policy flexibility of the prototype is evaluated. We present initial evidence that the architecture’s impact on both performance and code complexity is modest. Moreover, our architecture is applicable to many other types of operating systems and environments. 1
(Show Context)

Citation Context

...ented within a microkernel-based operating system with hardwareenforced address space separation between processes. Several recent efforts (e.g., SPIN [5], VINO [46] and the Java protection models in =-=[50]-=-) have presented softwareenforced process separation. The distinction is essentially irrelevant for the Flask architecture. It is essential that some form of separation between processes be provided, ...

Active Cache: Caching Dynamic Contents on the Web

by Pei Cao, Jin Zhang, Kevin Beach , 1998
"... ..."
Abstract - Cited by 159 (2 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...nt applets from bypassing the ActiveProxy class and gaining raw access to information and resources. Recent research results have significantly improved the robustness of Java’s run-time environments =-=[10]-=-. Thus, we rely on the existing mechanisms to force the applet to use the ActiveProxy class to access its objects as well as the computation and networking resources. The ActiveProxy class is also the...

Denali: Lightweight Virtual Machines for Distributed and Networked Applications

by Andrew Whitaker, Marianne Shaw, Steven D. Gribble - In Proceedings of the USENIX Annual Technical Conference , 2002
"... The goal of Denali is to safely execute many independent, untrusted server applications on a single physical machine. This would enable any developer to inject a new service into third-party Internet infrastructure; for example, dynamic content generation code could be introduced into content-delive ..."
Abstract - Cited by 150 (0 self) - Add to MetaCart
The goal of Denali is to safely execute many independent, untrusted server applications on a single physical machine. This would enable any developer to inject a new service into third-party Internet infrastructure; for example, dynamic content generation code could be introduced into content-delivery networks or caching systems. We believe that virtual machine monitors (VMMs) are ideally suited to this application domain. A VMM provides strong isolation by default, since one virtual machine cannot directly name a resource in another. In addition, VMMs defer the implementation of high-level abstractions to guest OSs, which greatly simplifies the kernel and avoids "layer-below" attacks. The main challenge in using a VMM for this application domain is in scaling the number of concurrent virtual machines that can simultaneously execute on it.
(Show Context)

Citation Context

...ultiple applications on an OS. Libraries (e.g., Java's class library) provide shared abstractions that can be subverted through layer-below attacks. The trend toward extensible security architectures =-=[42]-=- means that security policy must be expressed in two places (the host OS and the software virtual machine). Finally, resource management within a single VM is complicated by the ability to share resou...

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control

by Mark Samuel Miller , 2006
"... Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they ..."
Abstract - Cited by 124 (11 self) - Add to MetaCart
Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and functionality of the software systems we can successfully compose. This dissertation presents a framework for enabling those interactions between components needed for the cooperation we intend, while minimizing the hazards of destructive interference. Great progress on the composition problem has been made within the object paradigm, chiefly in the context of sequential, single-machine programming among benign components. We show how to extend this success to support robust composition of concurrent and potentially malicious components distributed over potentially malicious machines. We present E, a distributed, persistent, secure programming language, and CapDesk, a virus-safe desktop built in E, as embodiments of the techniques we explain.

Understanding Java stack inspection.

by Dan S Wallach, Edward W Felten - In Proc. IEEE Symposium on Security and Privacy, , 1998
"... ..."
Abstract - Cited by 121 (4 self) - Add to MetaCart
Abstract not found

Confined Types

by Boris Bokowski, Jan Vitek , 1999
"... Sharing and transfer of references is difficult to control in object-oriented languages. As information security is increasingly becoming software dependent, this difficulty poses serious problems for writing secure components. In this paper, we present a set of inexpensive syntactic constraints tha ..."
Abstract - Cited by 114 (2 self) - Add to MetaCart
Sharing and transfer of references is difficult to control in object-oriented languages. As information security is increasingly becoming software dependent, this difficulty poses serious problems for writing secure components. In this paper, we present a set of inexpensive syntactic constraints that strengthen encapsulation in object-oriented programs and facilitate the implementation of secure systems. We introduce two mechanisms: con ned types to impose static scoping on dynamic object references and anonymous methods which do not reveal the identity of the current instance (this). Confined types protect objects from use by untrusted code, while anonymous methods allow standard classes to be reused from con ned classes. We have implemented a verifier which performs a modular analysis of Java programs and provides a static guarantee that confinement is respected. We present security related programming examples.

A Safety-Oriented Platform for Web Applications

by Richard S. Cox, Jacob Gorm Hansen, Steven D. Gribble, Henry M. Levy - IN IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2006
"... The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and e-commerce services. Early Web browsers provided simple access to static hypertext documents. In contrast, modern browsers serve as de fa ..."
Abstract - Cited by 113 (6 self) - Add to MetaCart
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and e-commerce services. Early Web browsers provided simple access to static hypertext documents. In contrast, modern browsers serve as de facto operating systems that must manage dynamic and potentially malicious applications. Unfortunately, browsers have not properly adapted to their new role. As a consequence, they fail to provide adequate isolation across applications, exposing both users and Web services to attack. This paper
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University