{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T01:10:13Z","timestamp":1733274613465,"version":"3.30.1"},"reference-count":37,"publisher":"Elsevier BV","issue":"1-6","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1016\/s1389-1286(00)00075-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T13:56:52Z","timestamp":1027605412000},"page":"77-93","source":"Crossref","is-referenced-by-count":16,"title":["Supporting reconfigurable security policies for mobile programs"],"prefix":"10.1016","volume":"33","author":[{"given":"B","family":"Hashii","sequence":"first","affiliation":[]},{"given":"S","family":"Malabarba","sequence":"additional","affiliation":[]},{"given":"R","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"M","family":"Bishop","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"unstructured":"E. Amoroso, Fundamentals of Computer Security Technology, P T R Prentice-Hall, Englewood Cliffs, NJ, 1994.","key":"10.1016\/S1389-1286(00)00075-X_BIB1"},{"unstructured":"J.P. Anderson, Computer security technology planning study, Technical Report ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731, October 1972, [NTIS AD-758 206].","key":"10.1016\/S1389-1286(00)00075-X_BIB2"},{"unstructured":"L. Badger, D.F. Sterne, D.L. Sherman, K.M. Walker and S.A. Haghighat, Practical domain and type enforcement for UNIX, in: Proc. of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995, IEEE Comput. Soc. Press, pp. 66\u201377.","key":"10.1016\/S1389-1286(00)00075-X_BIB3"},{"doi-asserted-by":"crossref","unstructured":"M. Carney and B. Loe, A comparison of methods for implementing adaptive security policies, in: Proc. of the Seventh USENIX UNIX Security Symposium, San Antonio, TX, January 1998, pp. 1\u201314.","key":"10.1016\/S1389-1286(00)00075-X_BIB4","DOI":"10.21236\/ADA345381"},{"doi-asserted-by":"crossref","unstructured":"D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik, Itinerant agents for mobile computing, IEEE Personal Communications, October 1995, pp. 34\u201349.","key":"10.1016\/S1389-1286(00)00075-X_BIB5","DOI":"10.1109\/98.468361"},{"doi-asserted-by":"crossref","unstructured":"D. Chess, C. Harrison and A. Kershenbaum, Mobile agents: are they a good idea? in: J. Vitek and C. Tschudin (Eds.), Mobile Object Systems. Towards the Programmable Internet, Second International Workshop, MOS \u201996, Linz, number 1222 in Lecture Notes in Computer Science, July 1997, Springer, New York, pp. 25\u201347, Also available at http:\/\/www.research.ibm.com\/massdist\/mobag.ps.","key":"10.1016\/S1389-1286(00)00075-X_BIB6","DOI":"10.1007\/3-540-62852-5_5"},{"doi-asserted-by":"crossref","unstructured":"L. Cholvy and F. Cuppens, Analyzing consistency of security policies, in: 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE, pp. 103\u2013112.","key":"10.1016\/S1389-1286(00)00075-X_BIB7","DOI":"10.1109\/SECPRI.1997.601324"},{"doi-asserted-by":"crossref","unstructured":"F. Cuppens and C. Saurel, Specifying a security policy: a case study, in: 9th IEEE Computer Security Foundations Workshop, Kenmare, June 1996, IEEE Comput. Soc. Press, pp. 123\u2013134.","key":"10.1016\/S1389-1286(00)00075-X_BIB8","DOI":"10.1109\/CSFW.1996.503697"},{"unstructured":"D. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1983.","key":"10.1016\/S1389-1286(00)00075-X_BIB9"},{"doi-asserted-by":"crossref","unstructured":"D. Denning and P.J. Denning, Certification of programs for secure information flow, Communications of the ACM 20 (7) (1977) 504\u2013513.","key":"10.1016\/S1389-1286(00)00075-X_BIB10","DOI":"10.1145\/359636.359712"},{"doi-asserted-by":"crossref","unstructured":"G. Edjlali, A. Acharya and V. Chaudhary, History-based access control for mobile code, in: Proc. of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, November 1998, pp. 38\u201348.","key":"10.1016\/S1389-1286(00)00075-X_BIB11","DOI":"10.1145\/288090.288102"},{"doi-asserted-by":"crossref","unstructured":"\u00da. Erlingsson and F. Schneider, SASI enforcement of security policies: a retrospective, in: DISCEX\u201900, Proc. DARPA Information Survivability Conference and Exposition, Hilton Head, SC, January 2000, pp. 287\u2013295.","key":"10.1016\/S1389-1286(00)00075-X_BIB12","DOI":"10.1109\/DISCEX.2000.821527"},{"doi-asserted-by":"crossref","unstructured":"D. Evans and A. Twyman, Flexible policy-directed code safety, in: Proc. of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999, pp. 32\u201345.","key":"10.1016\/S1389-1286(00)00075-X_BIB13","DOI":"10.1109\/SECPRI.1999.766716"},{"doi-asserted-by":"crossref","unstructured":"T. Fraser and L. Badger, Ensuring continuity during dynamic security policy reconfiguration in DTE, in: Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May 1998, pp. 15\u201326.","key":"10.1016\/S1389-1286(00)00075-X_BIB14","DOI":"10.1109\/SECPRI.1998.674820"},{"doi-asserted-by":"crossref","unstructured":"T. Fraser, L. Badger and M. Feldman, Hardening COTS software with generic software wrappers, in: Proc. of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 2\u201316.","key":"10.1016\/S1389-1286(00)00075-X_BIB15","DOI":"10.1109\/SECPRI.1999.766713"},{"doi-asserted-by":"crossref","unstructured":"J.A. Goguen and J. Meseguer, Security policies and security models, in: Proc. of the 1982 Symposium on Security and Privacy, pp. 11\u201320.","key":"10.1016\/S1389-1286(00)00075-X_BIB16","DOI":"10.1109\/SP.1982.10014"},{"unstructured":"L. Gong, M. Mueller, H. Prafullchandra and R. Schemers, Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2, in: Proc. of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, December 1997, pp. 103\u2013112.","key":"10.1016\/S1389-1286(00)00075-X_BIB17"},{"doi-asserted-by":"crossref","unstructured":"B. Hashii, M. Lal, S. Samorodin and R. Pandey, Securing systems against external programs, IEEE Internet Computing, Nov.\/Dec. 1998, pp. 35\u201345.","key":"10.1016\/S1389-1286(00)00075-X_BIB18","DOI":"10.1109\/4236.735985"},{"unstructured":"C. Hawblitzel, C. Chang, G. Czajkowski, D. Hu and T. von Eicken, Implementing multiple protection domains in Java, Technical Report 97-1160, Cornell University, 1997.","key":"10.1016\/S1389-1286(00)00075-X_BIB19"},{"unstructured":"T. Jaeger, J. Liedtke and N. Islam, Operating system protection for fine-grained programs, in: Proc. of the 7th USENIX Security Symposium, San Antonio, TX, Jan. 1998, pp. 143\u2013157.","key":"10.1016\/S1389-1286(00)00075-X_BIB20"},{"unstructured":"JavaSoft, JDK 1.2 Documentation.","key":"10.1016\/S1389-1286(00)00075-X_BIB21"},{"doi-asserted-by":"crossref","unstructured":"S. Liang and G. Bracha, Dynamic class loading in the Java virtual machine, ACM SIGPLAN Notices 33 (10) (1998) 36\u201344.","key":"10.1016\/S1389-1286(00)00075-X_BIB22","DOI":"10.1145\/286942.286945"},{"doi-asserted-by":"crossref","unstructured":"S. Malabarba, R. Pandey, J. Gragg, E. Barr and F. Barnes, Runtime support for type-safe dynamic Java classes, in: Proc. of the European Conference on Object-Oriented Programming, Sophia Antipolis and Cannes, June 2000, Springer, To appear, Currently available at http:\/\/pdclab.cs.ucdavis.edu.","key":"10.1016\/S1389-1286(00)00075-X_BIB23","DOI":"10.21236\/ADA474895"},{"doi-asserted-by":"crossref","unstructured":"D.V. Miller and R.W. Baldwin, Access control by boolean expression evaluation, in: Fifth Annual Computer Security Applications Conference, Tucson, AZ, 1990, IEEE Comput. Soc. Press, pp. 131\u2013139.","key":"10.1016\/S1389-1286(00)00075-X_BIB24","DOI":"10.1109\/CSAC.1989.81042"},{"doi-asserted-by":"crossref","unstructured":"L.M. Null and J. Wong, The DIAMOND security policy for object-oriented databases, in: 1992 ACM Computer Science Conference, Communications Proceedings, Kansas City, MO, pp. 49\u201356.","key":"10.1016\/S1389-1286(00)00075-X_BIB25","DOI":"10.1145\/131214.131221"},{"doi-asserted-by":"crossref","unstructured":"R. Pandey and B. Hashii, Providing fine-grained access control for Java programs, in: 13th Conference on Object-Oriented Programming, ECOOP'99, Lecture Notes in Computer Science, Lisbon, June 1999, Springer, New York.","key":"10.1016\/S1389-1286(00)00075-X_BIB26","DOI":"10.1007\/3-540-48743-3_21"},{"unstructured":"T. Qian, Active capability: an application specific security and protection model, Technical report, University of Illinois at Urbana-Champaign, December 1996.","key":"10.1016\/S1389-1286(00)00075-X_BIB27"},{"unstructured":"T. Qian, Cherubim agent based dynamic security architecture, Technical report, University of Illinois at Urbana-Champaign, June 1998.","key":"10.1016\/S1389-1286(00)00075-X_BIB28"},{"doi-asserted-by":"crossref","unstructured":"T. Riechmann and F.J. Hauck, Meta objects for access control: extending capability-based security, in: New Security Paradigms Workshop, Langdale, 1997, pp. 17\u201322.","key":"10.1016\/S1389-1286(00)00075-X_BIB29","DOI":"10.1145\/283699.283735"},{"doi-asserted-by":"crossref","unstructured":"J.H. Saltzer and M.D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63 (9) (1975) 1278\u20131308.","key":"10.1016\/S1389-1286(00)00075-X_BIB30","DOI":"10.1109\/PROC.1975.9939"},{"doi-asserted-by":"crossref","unstructured":"J.W. Stamos and D.K. Gifford, Remote evaluation, ACM Transactions on Programming Languages and Systems 12 (4) (1990) 537\u2013565.","key":"10.1016\/S1389-1286(00)00075-X_BIB31","DOI":"10.1145\/88616.88631"},{"unstructured":"Standard Performance Evaluation Corporation, SPECjvm98 Documentation, 1.01 edition, August 1998, http:\/\/www.spec.org\/osg\/jvm98\/.","key":"10.1016\/S1389-1286(00)00075-X_BIB32"},{"doi-asserted-by":"crossref","unstructured":"T. Thorn, Programming languages for mobile code, ACM Computing Surveys 29 (3) (1997) 213\u2013239.","key":"10.1016\/S1389-1286(00)00075-X_BIB33","DOI":"10.1145\/262009.262010"},{"unstructured":"W. Venema, TCP Wrapper: network monitoring, access control, and booby traps, in: UNIX Security Symposium III Proceedings, Baltimore, MD, September 1992, USENIX Assoc., pp. 85\u201392.","key":"10.1016\/S1389-1286(00)00075-X_BIB34"},{"doi-asserted-by":"crossref","unstructured":"R. Wahbe, S. Lucco, T.E. Anderson and S.L. Graham, Efficient software-based fault isolation, in: 14th ACM Symposium on Operating Systems Principles, ACM, December 1993, pp. 203\u2013216.","key":"10.1016\/S1389-1286(00)00075-X_BIB35","DOI":"10.1145\/173668.168635"},{"unstructured":"D.S. Wallach, D. Balfanz, D. Dean and E.W. Felten, Extensible security architecture for Java, in: 16th ACM Symposium on Operating Systems Principles, Saint Malo, Oct. 1997, Operating System Review 31 (5), pp. 116\u2013128.","key":"10.1016\/S1389-1286(00)00075-X_BIB36"},{"doi-asserted-by":"crossref","unstructured":"D.S. Wallach and E.W. Felton, Understanding Java stack inspection, in: 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May 1998, IEEE Comput. Soc., pp. 52\u201363.","key":"10.1016\/S1389-1286(00)00075-X_BIB37","DOI":"10.1109\/SECPRI.1998.674823"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912860000075X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912860000075X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:28:34Z","timestamp":1733272114000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912860000075X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":37,"journal-issue":{"issue":"1-6","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["S138912860000075X"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00075-x","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}