Providing Fine-Grained Access Control For Mobile Programs Through Binary Editing
نویسندگان
چکیده
With the advent of WWW, there is considerable interest in programs that can migrate from one host to another and execute. For instance, Java programs are increasingly being used to add dynamic content to a web page. When a user accesses the web page through a browser, the browser migrates the Java program and executes it at the user’s site. Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access a host site’s protected resources. For instance, they can potentially read a user’s private files, access and modify personal information, and steal proprietary information. In this paper, we present a novel approach for allowing a site to protect and control the local resources that external Java programs can access. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to local resources and the conditions under which they apply. A set of code transformation tools enforce these constraints on a Java program by integrating the code for checking access constraints into the program and the site’s resource definitions. Executions of the resulting modified mobile program and resources satisfy all access constraints, thereby protecting the site’s resources. Because this approach does not require resources to make an explicit call to a reference monitor, as implemented in the Java runtime system, the approach does not depend upon a particular runtime system implementation. This work is supported by the Defense Advanced Research Project Agency (DARPA) and Rome Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-97-1-0221. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense Advanced Research Project Agency (DARPA), Rome Laboratory, or the U.S. Government.
منابع مشابه
Fine-Grained Access Control for RDF Data on Mobile Devices
Existing approaches for fine-grained access control for RDF data suffer from high overhead, making them ill-suited for mobile devices. This makes it difficult to develop mobile applications that manage personal RDF data in a privacy preserving manner. In this paper we propose a new approach to realise fine-grained access control for mobile devices. We show how fine-grained privacy settings for ...
متن کاملProviding Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host’s protected resources. In this paper, we present a nov...
متن کاملAn Access Control Framework for Protecting Mobile Health Records: The Case Study of Developing Countries
Mobile health records are a good way of providing users with on-demand access to health care data. Standard approaches of securing health records include role-based access control (RBAC) because this is a flexible approach to assign permissions to a wide variety of users. However, traditional RBAC models are not designed to enforce fine-grained access control. For instance, in mobile health rec...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملA Ramp Code for Fine-grained Access Control
Threshold ramp secret sharing schemes are designed so that (i) certain subsets of shares have no information about the secret, (ii) some subsets have partial information about the secret and (iii) some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998