2006
DOI: 10.1109/acsac.2006.7
|View full text |Cite
|
Sign up to set email alerts
|

A Module System for Isolating Untrusted Software Extensions

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…Likewise, also confined types can be understood using the concept of capabilities that are represented by types (Fong 2005). This idea is further elaborated by Fong in (Fong & Zhang 2004), (Fong 2006), (Fong 2008), and (Fong & Orr 2006). In the first paper, an additional type system is introduced that allows to specify the permitted operations on an object as it is passed from one method to the next.…”
Section: Type-based Securitymentioning
confidence: 94%
“…Likewise, also confined types can be understood using the concept of capabilities that are represented by types (Fong 2005). This idea is further elaborated by Fong in (Fong & Zhang 2004), (Fong 2006), (Fong 2008), and (Fong & Orr 2006). In the first paper, an additional type system is introduced that allows to specify the permitted operations on an object as it is passed from one method to the next.…”
Section: Type-based Securitymentioning
confidence: 94%