{"id":"https://openalex.org/W1974385017","doi":"https://doi.org/10.1109/isorc.2013.6913208","title":"Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine","display_name":"Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W1974385017","doi":"https://doi.org/10.1109/isorc.2013.6913208","mag":"1974385017"},"language":"en","primary_location":{"id":"doi:10.1109/isorc.2013.6913208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isorc.2013.6913208","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090762218","display_name":"Benjamin Venelle","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Benjamin Venelle","raw_affiliation_strings":["Alcatel-Lucent Bell Labs, Nozay, France","Alcatel-Lucent Bell Labs, 7 route de Villejust, 91620 Nozay, France"],"affiliations":[{"raw_affiliation_string":"Alcatel-Lucent Bell Labs, Nozay, France","institution_ids":[]},{"raw_affiliation_string":"Alcatel-Lucent Bell Labs, 7 route de Villejust, 91620 Nozay, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022420632","display_name":"J\u00e9r\u00e9my Briffaut","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117273","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Art","ror":"https://ror.org/02kgft750","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210117273"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jeremy Briffaut","raw_affiliation_strings":["ENSI-LIFO, Bourges, France","ENSI-LIFO, 88 bld Lahitolle, 18020 Bourges, France"],"affiliations":[{"raw_affiliation_string":"ENSI-LIFO, Bourges, France","institution_ids":["https://openalex.org/I4210117273"]},{"raw_affiliation_string":"ENSI-LIFO, 88 bld Lahitolle, 18020 Bourges, France","institution_ids":["https://openalex.org/I4210117273"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017788388","display_name":"Laurent Cl\u00e9vy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Laurent Clevy","raw_affiliation_strings":["Alcatel-Lucent Bell Labs, Nozay, France","Alcatel-Lucent Bell Labs, 7 route de Villejust, 91620 Nozay, France"],"affiliations":[{"raw_affiliation_string":"Alcatel-Lucent Bell Labs, Nozay, France","institution_ids":[]},{"raw_affiliation_string":"Alcatel-Lucent Bell Labs, 7 route de Villejust, 91620 Nozay, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064519167","display_name":"Christian Toinard","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117273","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Art","ror":"https://ror.org/02kgft750","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210117273"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Christian Toinard","raw_affiliation_strings":["ENSI-LIFO, Bourges, France","ENSI-LIFO, 88 bld Lahitolle, 18020 Bourges, France"],"affiliations":[{"raw_affiliation_string":"ENSI-LIFO, Bourges, France","institution_ids":["https://openalex.org/I4210117273"]},{"raw_affiliation_string":"ENSI-LIFO, 88 bld Lahitolle, 18020 Bourges, France","institution_ids":["https://openalex.org/I4210117273"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090762218"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4944,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75103494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530669212341309},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.8338781595230103},{"id":"https://openalex.org/keywords/strictfp","display_name":"strictfp","score":0.7405374050140381},{"id":"https://openalex.org/keywords/real-time-java","display_name":"Real time Java","score":0.6946868896484375},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.6591009497642517},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.6472518444061279},{"id":"https://openalex.org/keywords/java-card","display_name":"Java Card","score":0.6392824649810791},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.6147509217262268},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5987979769706726},{"id":"https://openalex.org/keywords/java-concurrency","display_name":"Java concurrency","score":0.5787392854690552},{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.5029777884483337},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4100441634654999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34464287757873535},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3401137590408325}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530669212341309},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.8338781595230103},{"id":"https://openalex.org/C174954855","wikidata":"https://www.wikidata.org/wiki/Q7623626","display_name":"strictfp","level":4,"score":0.7405374050140381},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.6946868896484375},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.6591009497642517},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.6472518444061279},{"id":"https://openalex.org/C47747970","wikidata":"https://www.wikidata.org/wiki/Q46101","display_name":"Java Card","level":4,"score":0.6392824649810791},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.6147509217262268},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5987979769706726},{"id":"https://openalex.org/C181907185","wikidata":"https://www.wikidata.org/wiki/Q1100098","display_name":"Java concurrency","level":4,"score":0.5787392854690552},{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.5029777884483337},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4100441634654999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34464287757873535},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3401137590408325}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isorc.2013.6913208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isorc.2013.6913208","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"16th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2013)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-00840729v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-00840729","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISORC - 6h IEEE International Symposium on Object, Component, and Service-Oriented Real-Time Distributed Computing - 2013, Jun 2013, Paderborn, Germany","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W4015096","https://openalex.org/W1498109646","https://openalex.org/W1501401133","https://openalex.org/W1614902435","https://openalex.org/W1644882639","https://openalex.org/W1888344413","https://openalex.org/W2047764386","https://openalex.org/W2052812542","https://openalex.org/W2060493407","https://openalex.org/W2061056245","https://openalex.org/W2079930171","https://openalex.org/W2085925880","https://openalex.org/W2100666033","https://openalex.org/W2143150127","https://openalex.org/W2155317744","https://openalex.org/W2161688581","https://openalex.org/W3102410487","https://openalex.org/W6636447621","https://openalex.org/W6639438982"],"related_works":["https://openalex.org/W1966703274","https://openalex.org/W2150852819","https://openalex.org/W1533139437","https://openalex.org/W2197133764","https://openalex.org/W2138972873","https://openalex.org/W412736943","https://openalex.org/W2066444215","https://openalex.org/W2068892086","https://openalex.org/W1606351121","https://openalex.org/W2347958312"],"abstract_inverted_index":{"Since":[0],"70's,":[1],"and":[2,18,41,59,106,142,157],"despite":[3,24],"its":[4,13,25],"operational":[5],"complexity,":[6],"Mandatory":[7],"Access":[8],"Control":[9],"(MAC)":[10],"has":[11,27],"demonstrated":[12,48],"reliability":[14],"to":[15,77,99,152],"enforce":[16],"integrity":[17],"confidentiality.":[19],"Surprisingly,":[20],"the":[21,38,68,80,85,118,125,129,150],"Java":[22,58,69,74,86,101,119],"technology,":[23],"popularity,":[26],"not":[28],"yet":[29],"adopted":[30],"this":[31],"protection":[32],"principle.":[33],"Current":[34],"security":[35,104],"features":[36],"within":[37,128],"JVM":[39],"(JAAS":[40],"bytecode":[42,90],"verifier)":[43],"can":[44],"be":[45],"bypassed,":[46],"as":[47,103,110],"by":[49],"summer":[50],"2012":[51],"attacks.":[52],"Thus,":[53,121],"a":[54,60],"MAC":[55,115],"model":[56],"for":[57,67],"cross":[61],"platform":[62],"reference":[63],"monitor":[64],"are":[65],"required":[66],"Virtual":[70],"Machine.":[71],"Security":[72],"Enhanced":[73],"(SEJava)":[75],"enables":[76],"control":[78],"dynamically":[79],"information":[81,126],"flows":[82,127],"between":[83,117],"all":[84,124],"objects":[87],"requiring":[88],"neither":[89],"nor":[91],"source":[92],"code":[93],"instrumentations.":[94],"The":[95],"main":[96],"idea":[97],"is":[98,133],"consider":[100],"types":[102],"contexts,":[105],"method":[107],"calls/field":[108],"accesses":[109],"permissions.":[111],"SEJava":[112,122],"allows":[113],"fine-grain":[114],"rules":[116],"objects.":[120],"controls":[123],"JVM.":[130],"Our":[131],"implementation":[132],"faster":[134],"than":[135],"concurrent":[136],"approaches":[137],"while":[138],"allowing":[139],"both":[140],"finer":[141],"more":[143],"advanced":[144],"controls.":[145],"A":[146],"use":[147],"case":[148],"shows":[149],"efficiency":[151],"protect":[153],"against":[154],"Common":[155],"Vulnerability":[156],"Exposures":[158],"in":[159],"an":[160],"efficient":[161],"manner.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
