Continuations from generalized stack inspection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interfaces for stack inspection

Stack inspection is a mechanism for programming secure applications in the presence of code from various protection domains. Run-time checks of the call stack allow a method to obtain information about the code that (directly or indirectly) invoked it in order to make access control decisions. This mechanism is part of the security architecture of Java and the .NET Common Language Runtime. A ce...

متن کامل

Understanding Java Stack Inspection

Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as being dependent on specific artifacts of the Java implementation. This paper models the stack inspection algorithm in terms of a well-understood logic for access control and demonstrates how stack inspection is a useful ...

متن کامل

Static Analysis for Stack Inspection

We propose two control flow analyses for the Java bytecode. They safely approximate the set of permissions granted/denied to code at run-time. This static information helps optimizing the implementation of the stack inspection algorithm.

متن کامل

Generalized Theories of Gravity and Conformal Continuations

Many theories of gravity admit formulations in different, conformally related manifolds, known as the Jordan and Einstein conformal frames. Among them are various scalar-tensor theories of gravity and high-order theories with the Lagrangian f (R) where R is the scalar curvature and f is an arbitrary function. It may happen that a singularity in the Einstein frame corresponds to a regular surfac...

متن کامل

Inlining in the presence of Stack Inspection ?

We consider languages that use stack inspection as an access control mechanism, and concentrate on a specific optimization technique, namely method inlining. Based on the static analysis of [5], we specify when this optimization is possible, preserving the policy for access control associated with applications. Remarkably, our proposal works even in the presence of dynamic linking.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGPLAN Notices

سال: 2005

ISSN: 0362-1340,1558-1160

DOI: 10.1145/1090189.1086393