Providing Fine-grained Access Control for Java Programs
نویسندگان
چکیده
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host’s protected resources. In this paper, we present a novel approach for controlling and protecting a site’s resources. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to resources. A set of code transformation tools enforces these constraints on mobile programs by integrating the access constraint checking code directly into the mobile program and resource definitions. Using this approach, a site does not need to explicitly include calls to reference monitors in order to protect resources. The performance analysis show that the approach performs better than reference monitor-based approaches in many cases. Copyright 2000 John Wiley & Sons, Ltd.
منابع مشابه
Providing Fine-Grained Access Control For Mobile Programs Through Binary Editing
With the advent of WWW, there is considerable interest in programs that can migrate from one host to another and execute. For instance, Java programs are increasingly being used to add dynamic content to a web page. When a user accesses the web page through a browser, the browser migrates the Java program and executes it at the user’s site. Mobile programs are appealing because they support eff...
متن کاملA Study on Fine-Grained Replications of Distributed Java Applications
In distributed object systems, object-oriented (OO) applications are replicated from remote servers to client sites to improve performance, scalability, and availability. This study focuses on fine-grained replications of distributed OO applications. Unlike the traditional replication scheme by which a self-contained application is replicated entirely at once, the finegrained replication scheme...
متن کاملZAC: Access Control in JavaScript
ZAC is a practical lightweight library for access control in JavaScript based on aspect orientation. The ZAC access control architecture is stack-based, very similar to the ones of Java and C#. However, ZAC integrates other interesting features for more expressive access control. First, access control policies can be enforced at the level of objects, which permits more fine-grained control over...
متن کاملJackal, A Compiler Based Implementation of Java for Clusters of Workstations
This paper describes the design of Jackal, a compiler-driven distributed shared memory implementation of the Java programming language. Our goal is to efficiently execute (unmodified) multithreaded Java programs on a cluster of workstations. Jackal consists of a native Java compiler and a runtime system that implements a distributed shared memory protocol for variable sized memory regions. The ...
متن کاملObject and Access Evolution in Jarrah
Persistent object evolution is at least as important as evolution at the system level since an object may outlive a system in which it is used and may be used in many systems concurrently. The programming language Jarrah is a Java extension supporting secure persistent objects and fine-grained access control to these objects. In this paper we describe the persistence and access control construc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Concurrency - Practice and Experience
دوره 12 شماره
صفحات -
تاریخ انتشار 1999