期刊文献+

基于语言的移动代码安全问题 被引量:2

Language-Based Mobile-Code Security
下载PDF
导出
摘要 With the development of Internet, traditional network is converting to active network computing, which makes the problem of mobile-code security emerge as one of the most challenges of research in Computer Science today. The literature introduces one method that solves the problem of mobile-code security: Language-Based Security,and decribes in detail several methods in this research area, such as Proof-Carrying Code(PCC) and Typed Assembly Language(TAL). Our resolvation of mobile-code safety is presented at last. With the development of Internet, traditional network is converting to active network computing, which makes the problem of mobile-code security emerge as one of the most challenges of research in Computer Science today. The literature introduces one method that solves the problem of mobile-code security: Language-Based Security, and decribes in detail several methods in this research area, such as Proof-Carrying Code(PCC) and Typed Assembly Language(TAL). Our resolvation of mobile-code safety is presented at last.
出处 《计算机科学》 CSCD 北大核心 2002年第11期110-114,共5页 Computer Science
基金 国家自然科学基金(项目编号60173049)
关键词 信息安全 移动代码 汇编语言 安全问题 Mobile-code, Code safety, Safety policy
  • 相关文献

参考文献11

  • 1Necula G C,Lee P. Safe Kernel Extensions Without Run-Time Checking. In: Proc. of the 2nd Symposium Operationing System Design and Implementation(OSDI'96), Seattle, Oct. 1996. 229~243
  • 2Necula G C, Lee P. Proof-carrying code. In: Nell D. Jones, ed. Conf. Record 24th Symposium on Principles of Programming Languages(POPL'97) ,Paris,Jan. 1997. 106~119
  • 3Necula G C. Compiling with Proofs: [PhD thesis]. Carnegie Mellon University Oct. 1998. Available as Technical Report CMUCS-98-154
  • 4Necula G C, Lee P. Efficient representation and validation of proofs. In: Proc. 13th Symp. Logic in Computer Science, IEEE,June. 1998,93~104
  • 5Necula G C,Lee P. The design and implementation of a certifying compiler. In:Proc. Conf. Programming Language Design and Implementation, ACM SIGPLAN, 1998. 333~ 344
  • 6Lee P,Necula G C. Research on Proof-Carrying Code on MobileCode Security. In:Proc. of the Workshop on Foundations of Mobile Code Security, Monterey, 1997
  • 7Necula G C,Lee P. Proof Generation in the Touchstone Theorem Prover. In: Proc. of the 17th Intl. Conf. on Automated Deduction, Pittsburgh, 13 June 2000
  • 8Colby C, et al. A Certifying Compiler for Java. In: Proc. of the 2000 ACM SIGPLAN Conf. on Programming Language Designand Implementation (PLDI00), Vancouver, British Columbia,Canada,2000.18~21
  • 9Colby C,Lee P,Necula G C. A Proof-Carrying Code Architecture for Java. In:Proc. of the 12th Intl. Conf. on Computer Aided Verification (CAV00), Chicago,July 2000
  • 10Morrisett G, Walker D, Crary K, Glew N. From System F to Typed Assembly Language. In: the Twenty-Fifth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,San Diego, CA, USA, Jan. 1998. 85~97

同被引文献7

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2廖振松,金海,李赤松.基于属性的信任协商模型[J].华中科技大学学报(自然科学版),2006,34(5):30-32. 被引量:3
  • 3Winsborough W H, Seamons K E, Jones V E. Automated Trust Negotiation[C]// DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000:88 - 102.
  • 4Barlow T, Hess A, Seamons K E. Trust Negotiation in Electronic Markets[ C]// Proc. of the 8th Research Symp. in Emerging Electronic Markets. Maastricht, 2001 : 1 - 11.
  • 5Bina E, Jones V, McCool R, et al. Secure Access to Data Over the Internet[ C]// Proceedings of the Third ACM/ IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, 1994:99- 102.
  • 6Skogsrud H, Benatallah B, Casati F. Trust-Serv: Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services[C]//Proc. of the 13th Int'l World Wide Web Conf. (www 2004). New York: ACM Press, 2004: 53 - 62.
  • 7卢兴华,赵强,刘志明,王红胜.安全通过方式——移动代码安全的新方法[J].计算机工程,2004,30(6):135-136. 被引量:1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部