{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:40:55Z","timestamp":1725489655318},"publisher-location":"Berlin, Heidelberg","reference-count":54,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748090"},{"type":"electronic","value":"9783540748106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74810-6_5","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T05:44:24Z","timestamp":1187329464000},"page":"135-159","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing Java Security with History Based Access Control"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Alpern, B., Attanasio, C.R., Barton, J.J., et al.: The jalape\u00f1o virtual machine. IBM System Journal 39(1) (2000)","DOI":"10.1147\/sj.391.0211"},{"key":"5_CR2","unstructured":"Anderson, A.: Java access control mechanisms. Technical report, Sun Microsystems (2002)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-540-30470-8_30","volume-title":"On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops","author":"F. Baiardi","year":"2004","unstructured":"Baiardi, F., Martinelli, F., Mori, P., Vaccarelli, A.: Improving grid service security with fine grain policies. In: Meersman, R., Tari, Z., Corsaro, A. (eds.) On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops. LNCS, vol.\u00a03292, pp. 123\u2013134. Springer, Heidelberg (2004)"},{"issue":"15","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1002\/spe.488","volume":"32","author":"M. Baker","year":"2002","unstructured":"Baker, M., Buyya, R., Laforenza, D.: Grids and grid technologies for wide-area distributed computing. International Journal of Software: Practice and Experience\u00a032(15), 1437\u20131466 (2002)","journal-title":"International Journal of Software: Practice and Experience"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1145\/1065010.1065047","volume-title":"PLDI \u201905: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation","author":"L. Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI \u201905: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp. 305\u2013314. ACM Press, New York (2005)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/507711.507732","volume-title":"Proceedings of the 7th ACM symposium on Access control models and technologies (SACMAT 2002)","author":"D.W. Chadwick","year":"2002","unstructured":"Chadwick, D.W., Otenko, O.: The permis x.509 role based privilege management infrastructure. In: Proceedings of the 7th ACM symposium on Access control models and technologies (SACMAT 2002), pp. 135\u2013140. ACM Press, New York (2002)"},{"key":"5_CR7","unstructured":"Chadwick, D.W., Otenko, S., Welch, V.: Using SAML to Link the GLOBUS Toolkit to the PERMIS Authorisation Infrastructure. In: Proceedings of Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (September 2004)"},{"issue":"5-6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/S0167-739X(99)00011-4","volume":"15","author":"S.J. Chapin","year":"1999","unstructured":"Chapin, S.J., Katramatos, D., Karpovich, J., Grimshaw, A.: Resource management in Legion. Future Generation Computer Systems\u00a015(5-6), 583\u2013594 (1999)","journal-title":"Future Generation Computer Systems"},{"key":"5_CR9","first-page":"47","volume-title":"19th Int.l Information Security Conference (SEC 2004)","author":"V. Ciaschini","year":"2004","unstructured":"Ciaschini, V., Gorrieri, R.: Contrasting malicious java applets by modifying the java virtual machine. In: 19th Int.l Information Security Conference (SEC 2004), pp. 47\u201364. Kluwer, Dordrecht (2004)"},{"issue":"5","key":"5_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/358438.349315","volume":"35","author":"C. Colby","year":"2000","unstructured":"Colby, C., Lee, P., Necula, G.C., Blau, F., Plesko, M., Cline, K.: A certifying compiler for Java. ACM SIGPLAN Notices\u00a035(5), 95\u2013107 (2000)","journal-title":"ACM SIGPLAN Notices"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloan, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201339. Springer, Heidelberg (2001)"},{"issue":"1\/2","key":"5_CR12","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3233\/JCS-2002-101-204","volume":"10","author":"S. Eckmann","year":"2002","unstructured":"Eckmann, S., Vigna, G., Kemmerer, R.: Statl: An attack language for state-based intrusion detection. Journal of Computer Security\u00a010(1\/2), 71\u2013104 (2002)","journal-title":"Journal of Computer Security"},{"key":"5_CR13","unstructured":"Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Adviser-Fred B. Schneider (2004)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Schneider, F.B.: IRM enforcement of Java stack inspection. In: IEEE Symposium on Security and Privacy, pp. 246\u2013255 (2000)","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"5_CR15","volume-title":"WNSP: New Security Paradigms Workshop","author":"U. Erlingsson","year":"2000","unstructured":"Erlingsson, U., Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: WNSP: New Security Paradigms Workshop, ACM Press, New York (2000)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Evans, D., Twyman, A.: Flexible policy-directed code safety. In: IEEE Symposium on Security and Privacy, pp. 32\u201345 (1999)","DOI":"10.1109\/SECPRI.1999.766716"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11577188_2","volume-title":"Network and Parallel Computing","author":"I. Foster","year":"2005","unstructured":"Foster, I.: Globus toolkit version 4: Software for service-oriented systems. In: Jin, H., Reed, D., Jiang, W. (eds.) NPC 2005. LNCS, vol.\u00a03779, pp. 2\u201313. Springer, Heidelberg (2005)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C.: The globus project: A status report. In: Proceedings of IPPS\/SPDP 1998 Heterogeneous Computing Workshop, pp. 4\u201318 (1998)","DOI":"10.1109\/HCW.1998.666541"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: The physiology of the grid: An open grid service architecture for distributed system integration. Globus Project (2002), http:\/\/www.globus.org\/research\/papers\/ogsa.pdf","DOI":"10.1109\/MC.2002.1009167"},{"issue":"3","key":"5_CR20","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications\u00a015(3), 200\u2013222 (2001)","journal-title":"International Journal of Supercomputer Applications"},{"key":"5_CR21","unstructured":"GCC: the GNU compiler collection, http:\/\/gcc.gnu.org\/"},{"key":"5_CR22","volume-title":"Inside Java2 Platform Security","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java2 Platform Security, 2nd edn. Addison-Wesley, Reading (1999)","edition":"2"},{"key":"5_CR23","unstructured":"Globus GRAM architecture, http:\/\/www-unix.globus.org\/developer\/gram-architecture.html"},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/367742.367773","volume":"19","author":"R. Grimm","year":"2001","unstructured":"Grimm, R., Bershad, B.N.: Separating access control policy, enforcement, and functionality in extensible systems. ACM Transactions on Computer Systems\u00a019(1), 36\u201370 (2001)","journal-title":"ACM Transactions on Computer Systems"},{"key":"5_CR25","unstructured":"JSR 118\u00a0Expert Group: Security for GSM\/UMTS compliant devices recommended practice. addendum to the mobile information device profile. Technical report, Java Community Process (November 2002), http:\/\/www.jcp.org\/aboutJava\/communityprocess\/maintenance\/jsr118\/"},{"key":"5_CR26","unstructured":"JSR 120\u00a0Expert Group: Wireless messaging api (wma) for Java 2 micro edn. Technical Report JSR 120, Java Community Process (2003), http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr120\/"},{"key":"5_CR27","unstructured":"JSR 205\u00a0Expert Group: Wireless messaging api 2.0 (wma) for Java 2 micro edn. Technical Report JSR 205, Java Community Process (2004), http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr205\/"},{"issue":"8","key":"5_CR28","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C.A.R. Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Commun. ACM\u00a021(8), 666\u2013677 (1978)","journal-title":"Commun. ACM"},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JPROC.2004.842776","volume":"93","author":"M. Humphrey","year":"2005","unstructured":"Humphrey, M., Thompson, M.R., Jackson, K.R.: Security for grids. Proceedings of the IEEE\u00a093(3), 644\u2013652 (2005)","journal-title":"Proceedings of the IEEE"},{"key":"5_CR30","unstructured":"Sun\u00a0Microsystems Inc. Mobile Information Device Profile for Java 2 micro edn. Technical Report JSR 118, Java Community Process (November 2002), http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr118\/index.html"},{"key":"5_CR31","unstructured":"Sun Microsystems Inc. The Connected Limited Device Configuration specification. Technical Report JSR 139, Java Community Process (March 2003), http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr139\/"},{"key":"5_CR32","first-page":"31","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 31\u201342. IEEE Press, Los Alamitos (1997)"},{"key":"5_CR33","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G.: The Java Language Specification. Sun Microsystems (2000)"},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36133-2_18","volume-title":"Grid Computing - GRID 2002","author":"K. Keahey","year":"2002","unstructured":"Keahey, K., Welch, V.: Fine-grain authorization for resource management in the grid environment. In: Parashar, M. (ed.) GRID 2002. LNCS, vol.\u00a02536, pp. 199\u2013206. Springer, Heidelberg (2002)"},{"key":"5_CR35","volume-title":"Proceedings of the 2nd International Conference on Autonomic and Autonomous Systems (ICAS 2006)","author":"H. Koshutanski","year":"2006","unstructured":"Koshutanski, H., Martinelli, F., Mori, P., Vaccarelli, A.: Fine-grained and history-based access control with trust management for autonomic grid services. In: Proceedings of the 2nd International Conference on Autonomic and Autonomous Systems (ICAS 2006), IEEE Computer Society, Los Alamitos (2006)"},{"issue":"1-2","key":"5_CR36","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security\u00a04(1-2), 2\u201316 (2005)","journal-title":"International Journal of Information Security"},{"key":"5_CR37","unstructured":"Lindholm, T., Yellin, F.: The Java Virtual Machine Specification. Sun Microsystems (1999)"},{"issue":"1","key":"5_CR38","first-page":"1057","volume":"290","author":"F. Martinelli","year":"2003","unstructured":"Martinelli, F.: Analysis of security protocols as open systems. Journal of Computer Security\u00a0290(1), 1057\u20131106 (2003)","journal-title":"Journal of Computer Security"},{"key":"5_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/11494881_8","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"F. Martinelli","year":"2005","unstructured":"Martinelli, F.: Towards an integrated formal analysis for security and trust. In: Steffen, M., Zavattaro, G. (eds.) FMOODS 2005. LNCS, vol.\u00a03535, pp. 115\u2013130. Springer, Heidelberg (2005)"},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/ICAS-ICNS.2005.93","volume-title":"Proceedings of Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS-ICNS 2005)","author":"F. Martinelli","year":"2005","unstructured":"Martinelli, F., Mori, P., Vaccarelli, A.: Towards continuous usage control on grid computational services. In: Proceedings of Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS-ICNS 2005), p. 82. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR41","unstructured":"Nagaratnam, N., Janson, P., Dayka, J., Nadalin, A., Siebenlist, F., Welch, V., Foster, I., Tuecke, S.: Security architecture for open grid services. In: GGF OGSA Security Working Group (2003)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106\u2013119 (1997)","DOI":"10.1145\/263699.263712"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Necula, G.C., Lee, P.: The design and implementation of a certifying compiler. In: Proceedings of the 1998 ACM SIGPLAN Conference on Prgramming Language Design and Implementation (PLDI), pp. 333\u2013344 (1998)","DOI":"10.1145\/277650.277752"},{"issue":"14","key":"5_CR44","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1002\/1096-9128(20001210)12:14<1405::AID-CPE515>3.0.CO;2-O","volume":"12","author":"R. Pandey","year":"2000","unstructured":"Pandey, R., Hashii, B.: Providing fine-grained access control for Java programs via binary editing. Concurrency: Practice and Experience\u00a012(14), 1405\u20131430 (2000)","journal-title":"Concurrency: Practice and Experience"},{"key":"5_CR45","volume-title":"The modelling and analysis of security protocols: the CSP approach","author":"P. Ryan","year":"2000","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G.: The modelling and analysis of security protocols: the CSP approach. Addison-Wesley, Reading (2000)"},{"key":"5_CR46","unstructured":"Soman, S., Krintz, C., Vigna, G.: Detecting malicious java code using virtual machine auditing. In: 12th USENIX Security Symposium (2003)"},{"key":"5_CR47","unstructured":"Spencer, B., Finholt, T.A., Foster, I., Kesselman, C., Beldica, C., Futrelle, J., Gullapalli, S., Hubbard, P., Liming, L., Marcusiu, D., Pearlman, L., Severance, C., Yang, G.: Neesgrid: A distributed collaboratory for advanced earthquake engineering experiment and simulation. In: 13th World Conference on Earthquake Engineering (2004)"},{"key":"5_CR48","unstructured":"http:\/\/java.sun.com\/javame\/downloads\/index.jsp"},{"key":"5_CR49","unstructured":"Thompson, M.R., Essiari, A., Keahey, K., Welch, V., Lang, S., Liu, B.: Fine-grained authorization for job and resource management using akenti and the globus toolkit. In: Proceedings of Computing in High Energy and Nuclear Physics (2003)"},{"key":"5_CR50","volume-title":"DISCEX 2000","author":"G. Vigna","year":"2000","unstructured":"Vigna, G., Eckmann, S., Kemmerer, R.: The stat tool suite. In: DISCEX 2000, Hilton Head, South Carolina, IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"5_CR51","unstructured":"Wallach, D.S.: A New Approach to Mobile Code Security. PhD thesis, Princeton University, New Jersey (1999)"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Wallach, D.S., Balfanz, D., Dean, D., Felten, E.W.: Extensible security architectures for Java. In: 16th Symposium on Operating Systems Principles, pp. 116\u2013128 (1997)","DOI":"10.1145\/268998.266668"},{"key":"5_CR53","volume-title":"IEEE Symposium on Security and Privacy","author":"D.S. Wallach","year":"1998","unstructured":"Wallach, D.S., Felten, E.W.: Undestanding java stack inspection. In: IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos (1998)"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L., Tuecke, S.: Security for grid services. In: 12th IEEE International Symp. on High Performance Distributed Computing (2003)","DOI":"10.1109\/HPDC.2003.1210015"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74810-6_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:24:11Z","timestamp":1605763451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74810-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748090","9783540748106"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74810-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}