Show simple item record

dc.contributor.authorErlingsson, Ulfaren_US
dc.contributor.authorSchneider, Fred Ben_US
dc.date.accessioned2007-04-09T19:47:29Z
dc.date.available2007-04-09T19:47:29Z
dc.date.issued2000-02-19en_US
dc.identifier.citationhttp://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR2000-1786en_US
dc.identifier.urihttps://hdl.handle.net/1813/5779
dc.description.abstractTwo implementations are given for Java's stack-inspection access-control policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different formulation of the policy. Performance of the implementations is evaluated, and one is found to be competitive with Java's less-flexible, JVM-resident implementation. The exercise illustrates the power of the IRM approach for enforcing security policies.en_US
dc.format.extent340873 bytes
dc.format.extent879135 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_USen_US
dc.publisherCornell Universityen_US
dc.subjectcomputer scienceen_US
dc.subjecttechnical reporten_US
dc.titleIRM Enforcement of Java Stack Inspectionen_US
dc.typetechnical reporten_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Statistics