Secure Java']Java development with UML

被引:0
|
作者
Jürjens, J [1 ]
机构
[1] Univ Oxford, Comp Lab, Oxford OX1 3QD, England
关键词
distributed systems security; access control; mobile code; !text type='Java']Java[!/text] security; secure software engineering; Unified Modeling Language;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Developing secure software systems is difficult and error-prone. Numerous implementations have been found vulnerable in the past; a recent example is the unauthorised access to millions of online account details at an American bank. We aim to address this general problem in the context of development in Java. While the JDK 1.2 security architecture offers features (such as guarded objects) that provide a high degree of flexibility and the possibility to perform fine-grained access control, these features are not so easy to use correctly. We show how to use a formal core of the Unified Modeling Language (UML), the de-facto industry-standard in object-oriented modelling, to correctly employ Java security concepts as such as signing, sealing, and guarding objects, We prove results for verification of specifications wrt. security requirements, We illustrate our approach with a (simplified) account of the development of a web-based financial application from formal specifications.
引用
收藏
页码:107 / 124
页数:18
相关论文
共 50 条
  • [21] Proposal of a method to support testing for Java']Java programs with UML
    Katayama, T
    Yabuya, Y
    12TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2005, : 533 - 540
  • [22] JUMP-From Java']Java Annotations to UML Profiles
    Bergmayr, Alexander
    Grossniklaus, Michael
    Wimmer, Manuel
    Kappel, Gerti
    MODEL-DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, MODELS 2014, 2014, 8767 : 552 - 568
  • [23] Java']Java engine for UML based hybrid state machines
    Borshchev, AV
    Kolesov, YB
    Senichenkov, YB
    PROCEEDINGS OF THE 2000 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2000, : 1888 - 1894
  • [24] A framework to translate UML class generalization into Java']Java code
    Sánchez, P
    Letelier, P
    Pastor, JA
    Ortega, JA
    OBJECT-ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2002, 2425 : 173 - 185
  • [25] Mapping UML designs to Java™
    IBM T.J. Watson Research Center, PO Box 704, Yorktown Heights, NY 10598, United States
    Proc Cinf Object Orient Program Syst Lang Appl OOPSLA, 1600, 10 (178-187):
  • [26] Experience with secure multi-processing in Java']Java
    Balfanz, D
    Gong, L
    18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1998, : 398 - 405
  • [27] Java']Java bytecode verification for secure information flow
    Avvenuti, M
    Bernardeschi, C
    De Francesco, N
    ACM SIGPLAN NOTICES, 2003, 38 (12) : 20 - 27
  • [28] Secure self-certified code for Java']Java
    Debbabi, M
    Desharnais, J
    Fourati, M
    Menif, E
    Painchaud, F
    Tawbi, N
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 133 - 151
  • [29] A secure object sharing scheme for Java']Java Card
    Zhang, JQ
    Varadharajan, V
    Mu, Y
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 243 - 251
  • [30] Secure object flow analysis for Java']Java Card
    Éluard, M
    Jensen, T
    USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 97 - 110