Learn Protection: Complete Implementation Guide

发布于 10 小时前  1 次阅读


Recently I was working on a project involving A, and I thought it'd be helpful to share some insights.

Found this helpful? Share it with your team and leave a comment below!

正文

Statement on Environmental Responsibility Policy A Secure Java Virtual Machine

Virtual Machine is viewed by many as inherently insecure despite all

the efforts to improve its security. In this paper we take a different

approach to Java security and describe the design and implementation of a

system that provides operating system style protection for Java code.

We use hardware protection domains to separate Java classes, provide

access control on cross domain method invocations, efficient data

sharing between protection domains, and memory and CPU resource control.

These security measures, when they do not violate the policy, are all

transparent to the Java programs, even when a subclass is in one domain

and its superclass is in another. To reduce the performance impact we

group classes and share them between protection domains and map data on demand as it is being shared.

Leendert van Doorn, IBM T.J. Watson Research Center

booktitle = {9th USENIX Security Symposium (USENIX Security 00)},

url = {https://www.usenix.org/conference/9th-usenix-security-symposium/secure-java-virtual-machine},

More Details

There are a few more points worth noting. First, browser compatibility varies across different browsers. Second, performance optimization is crucial when handling large amounts of data. Finally, key management is also an important consideration.

Feel free to ask questions in the comments - I'll reply as soon as possible.

Reference: A Secure Java Virtual Machine - USENIX


点击体验一键VMP加密 |下滑查看JSVMP相关文章