Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
DOI: 10.1109/csac.1999.816038
|View full text |Cite
|
Sign up to set email alerts
|

User authentication and authorization in the Java/sup TM/ platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(44 citation statements)
references
References 16 publications
0
43
0
Order By: Relevance
“…Generally, there are two distinct areas in mobile code security: (1) protection of the host from malicious mobile code and (2) protection of the mobile code from malicious hosts or users. Researchers have presented several models and mechanisms to deal with malicious code [20,29], such as Sandbox [19,10,15], code signing/code access [16], proof carrying code [17], etc. Protection of mobile code, however, is still an open problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, there are two distinct areas in mobile code security: (1) protection of the host from malicious mobile code and (2) protection of the mobile code from malicious hosts or users. Researchers have presented several models and mechanisms to deal with malicious code [20,29], such as Sandbox [19,10,15], code signing/code access [16], proof carrying code [17], etc. Protection of mobile code, however, is still an open problem.…”
Section: Related Workmentioning
confidence: 99%
“…The two mainstream runtime environments currently adopted in industry are Common Language Runtime (CLR) in .Net and Java Runtime Environment (JRE) in Java. In Java, the security in JDK1.0 and JDK1.1 uses a sandbox model to restrict the access of Java Applets based on code source and digital signature, while in JDK1.2, a user-based access control model is introduced [10,15]. Similar to Java, .Net enforces a code access security model based on code source and location, as well as a role-based security model [16].…”
Section: Introductionmentioning
confidence: 99%
“…It also provides a uniform interface for authentication that is compatible with many authentication provisions, and thus provides complementary functionality to the GSS API. The Java Authentication and Authorization System API (JAAS API) bases its authentication on the PAM API in the Java language environment [14].…”
Section: Pluggable Authentication Module Api (Pam Api)mentioning
confidence: 99%
“…For example, CORBA Security [7] has replaceable AccessDecision and other interfaces. Java authentication and authorization service (JAAS) [8,9], which recently became a part of J2SE v1.4, has replaceable interface Policy that serves authorization decisions. Although appearing to be versatile, the ADME schema comes with two major drawbacks.…”
Section: Mdme --Everything Is Done By Middlewarementioning
confidence: 99%