Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Secure Java Class Loading

Published: 01 November 1998 Publication History

Abstract

The class loading mechanism, central to Java, plays a key role in JDK 1.2 by enabling an improved security policy that is permission-based and extensible. The author concludes that JDK 1.2 has introduced a powerful and secure class loading mechanism. It not only enforces type safety and name space separation but also has a significant role in the new security architecture that supports fine grained, permission based access control. The new class loading mechanism's flexibility-through its delegation scheme and the rich set of class loader classes-gives Java applications and applets greater freedom to customize and specify how, when, and from where classes are loaded. Because the class loading mechanism is central to both the correctness and the security of the Java runtime system, we would like to model and define this mechanism, perhaps in a formal verification system. We can then obtain a formal specification and prove (or disprove) that the mechanism as currently designed is sufficient for security

References

[1]
J. Gosling B. Joy and G. Steele, The Java Language Specification, Addison-Wesley, Menlo Park, Calif., 1996.
[2]
T. Lindholm and F. Yellin, The Java Virtual Machine Specification, Addison-Wesley, Menlo Park, Calif., 1997.
[3]
L. Gong, "Java Security: Present and Near Future," IEEE Micro, Vol. 17, No. 3, May/June 1997, pp. 14-19.
[4]
L. Gong, et al., "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2," Proc. Usenix Symp. Internet Technologies and Systems, 1997, Usenix Assoc., Berkeley, Calif., pp. 103-112.
[5]
S. Liang and G. Bracha, "Dynamic Class Loading in the Java Virtual Machine," Proc. ACM Conf. Object Oriented Programming Systems, Languages, and Applications, ACM Press, New York, 1998.

Cited By

View all
  • (2017)Code Generation in Serializers and Comparators of Apache FlinkProceedings of the 12th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems10.1145/3098572.3098579(1-6)Online publication date: 19-Jun-2017
  • (2003)Protecting Java component integrity against Trojan Horse programsIntegrity and internal control in information systems V10.5555/941406.941413(99-113)Online publication date: 1-Jan-2003
  • (2003)Computer vision-assisted interaction in X3D virtual environment on WWWProceedings of the 2nd international conference on Human.society@internet10.5555/1758796.1758842(332-341)Online publication date: 18-Jun-2003
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Internet Computing
IEEE Internet Computing  Volume 2, Issue 6
November 1998
95 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 November 1998

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Code Generation in Serializers and Comparators of Apache FlinkProceedings of the 12th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems10.1145/3098572.3098579(1-6)Online publication date: 19-Jun-2017
  • (2003)Protecting Java component integrity against Trojan Horse programsIntegrity and internal control in information systems V10.5555/941406.941413(99-113)Online publication date: 1-Jan-2003
  • (2003)Computer vision-assisted interaction in X3D virtual environment on WWWProceedings of the 2nd international conference on Human.society@internet10.5555/1758796.1758842(332-341)Online publication date: 18-Jun-2003
  • (2002)Customizable Deployment, Composition, and Hosting of Distributed Java ApplicationsOn the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 200210.5555/646748.759570(845-865)Online publication date: 30-Oct-2002
  • (2002)Type based adaptationProceedings of the 3rd international conference on Software engineering and middleware10.5555/1756361.1756373(130-143)Online publication date: 20-May-2002
  • (2001)Reflections on MOPs, Components, and Java SecurityProceedings of the 15th European Conference on Object-Oriented Programming10.5555/646158.679875(256-274)Online publication date: 18-Jun-2001
  • (2001)Formalizing the safety of Java, the Java virtual machine, and Java cardACM Computing Surveys10.1145/503112.50311533:4(517-558)Online publication date: 1-Dec-2001
  • (2000)A secure execution framework for JavaProceedings of the 7th ACM conference on Computer and Communications Security10.1145/352600.352608(43-52)Online publication date: 1-Nov-2000
  • (2000)Secure Electronic Payments Based on Mobile AgentsDistributed and Parallel Databases10.1023/A:10087337222798:4(447-470)Online publication date: 1-Oct-2000

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media