Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Discretionary capability confinement

Published: 28 March 2008 Publication History

Abstract

Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilities in a Java-like programming language. Addressing a common critique of capability systems, the proposed annotation system can provably enforce capability confinement. This confinement guarantee is leveraged to model a strong form of separation of duty known as hereditary mutual suspicion. The annotation system has been fully implemented in a standard Java Virtual Machine.

Cited By

View all
  • (2010)Isolating untrusted software extensions by custom scoping rulesComputer Languages, Systems and Structures10.1016/j.cl.2009.12.00236:3(268-287)Online publication date: 1-Oct-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Information Security
International Journal of Information Security  Volume 7, Issue 2
March 2008
68 pages
ISSN:1615-5262
EISSN:1615-5270
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 March 2008

Author Tags

  1. Access control
  2. Capability
  3. Confinement
  4. Java Virtual Machine
  5. Language-based security
  6. Scoping rule

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Isolating untrusted software extensions by custom scoping rulesComputer Languages, Systems and Structures10.1016/j.cl.2009.12.00236:3(268-287)Online publication date: 1-Oct-2010

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media