Distributed Policy Management for JDK 1.2
نویسندگان
چکیده
In JDK 1.2, the security architecture supports fine grained access control. In the default implementation, Java runtime modules (classes) are signed, and permissions are configured through a configuration file using the signer’s identity and the loading location (URL) of the module. In a large network, the number of applets and the frequency of changes to the security policy will eventually grow very large. In a large organization, changing the configuration file in all Java enabled workstations and devices every time a need arises may be very hard. In this paper, we describe a better scaling solution. We use authorization certificates to delegate permissions to Java modules. In JDK 1.2, the permissions are attached to the runtime modules through protection domains. In our implementation, each protection domain may be decorated with one or more SPKI certificates. These certificates directly describe the possible permissions of the domain. The actual permissions depend on the currently valid certificate chains leading to these certificates. In addition to the certificates distributed with the modules, certificates for the chains may be retrieved from a distributed directory service. This approach makes it possible to fully distribute Java security policy management, allowing, among other things, security policy to be changed and new permissions types to be introduced without any modifications to the local configuration. Furthermore, the permissions need not be statically assigned but can be dynamically derived from the SPKI certificates as
منابع مشابه
The Evolution of Java Security
This paper provides a high-level overview of the development and evolution of Java security. Java is a maturing technology that has evolved from its commercial origins as a browser-based scripting tool. We review the various deployment environments in which Java is being targeted, some of its run-time characteristics, the security features in the current releases of the base technology, the new...
متن کاملSeamless Object Authentication in Different Security Policy Domains
In the trading of intangible goods, there co-exist, from the security policy point of view, several different domains, such as CORBA and Java. In such environment, mobile objects, such as Applet, can move freely between domains, which contributes greatly to the dynamic evolution of the distributed computer system. However, there arises a new security problem: there is no way for the mobile obje...
متن کاملJava-Based DSM with Object-Level Coherence Protocol Selection
This paper describes a Java-based distributed shared memory system (DSM) that simultaneously supports multiple coherence protocols. Coherence is enforced at the object level, and programmers can select the desired policy at object-creation time. Our work extends the Aleph Toolkit [1], a framework for distributed computing in Java. Since Aleph and our extensions are written in pure Java, the sys...
متن کاملAdding SPKI Certificates to JDK 1.2
The Java Development Kit (JDK) has included the concepts of cryptographic keys, signatures and certificates since version 1.0, and they have been improved and extended in JDK 1.2. However, the certificate interfaces still only cover identity certificates. As more and more security software makes use of authorization certificates, we feel that the concept of an authorization certificate and its ...
متن کاملWireless communications: security management against cloned cellular phones
Digital Object Identifier : 10.1109/WCNC.1999.796970 This work presents the development of a distributed security management system for telecommunication networks. The system consists in reducing the use of cloned mobile telephones (same both number and series of a genuine phone a perfect copy) using three main techniques. (1) An ISO Formal Technique (LOTOS) is used to specify and validate the ...
متن کامل