[KİTAP][B] The inlined reference monitor approach to security policy enforcement
U Erlingsson - 2004 - search.proquest.com
Embedding security enforcement code into applications is an alternative to traditional
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
Using production grammars in software testing
Extensible typesafe systems, such as Java, rely critically on a large and complex software
base for their overall protection and integrity, and are therefore difficult to test and verify …
base for their overall protection and integrity, and are therefore difficult to test and verify …
Static analyses for eliminating unnecessary synchronization from Java programs
This paper presents and evaluates a set of analyses designed to reduce synchronization
overhead in Java programs. Monitor-based synchronization in Java often causes significant …
overhead in Java programs. Monitor-based synchronization in Java often causes significant …
Termination in language-based systems
A Rudys, DS Wallach - ACM Transactions on Information and System …, 2002 - dl.acm.org
Language run-time systems are increasingly being embedded in systems to support run-
time extensibility via mobile code. Such systems raise a number of concerns when the code …
time extensibility via mobile code. Such systems raise a number of concerns when the code …
Simulation including multiple simulators
SS Phatak, H Chen, Y **ao, C Wang - US Patent 11,314,907, 2022 - Google Patents
In some examples, one or more computing devices on a network may receive, from a client
computing device, one or more inputs for configuring a simulation, the simulation including …
computing device, one or more inputs for configuring a simulation, the simulation including …
Applet server that provides applets in various forms
E Balassanian - US Patent 6,324,685, 2001 - Google Patents
The present invention is an applet server which accepts requests for applets from client
computers. A request specifies the format in which an applet is to be delivered to the …
computers. A request specifies the format in which an applet is to be delivered to the …
[KİTAP][B] A new approach to mobile code security
DS Wallach - 1999 - search.proquest.com
This dissertation presents a novel security architecture called security-passing style and
motivates its application to security issues that arise in mobile code systems such as Java …
motivates its application to security issues that arise in mobile code systems such as Java …
[PDF][PDF] Nested Java processes: OS structure for mobile code
P Tullman, J Lepreau - Proceedings of the 8th ACM SIGOPS European …, 1998 - dl.acm.org
The majority of work on protection in single-language mobile code environments focuses on
information security issues and depends on the language environment for solutions to the …
information security issues and depends on the language environment for solutions to the …
Application server facilitating with client's computer for applets along with various formats
E Balassanian - US Patent 6,976,248, 2005 - Google Patents
The present invention is an applet Server which accepts requests for applets from client
computers. A request Speci fies the format in which an applet is to be delivered to the …
computers. A request Speci fies the format in which an applet is to be delivered to the …
[PDF][PDF] Testing Java virtual machines
Abstract The Java Virtual Machine (JVM) has emerged as a ubiquitous platform for network
computing. JVMs have been incorporated into browsers, web servers, database engines …
computing. JVMs have been incorporated into browsers, web servers, database engines …