A flexible access control service for Java']Java mobile code

被引:5
|
作者
Corradi, A [1 ]
Montanari, R [1 ]
Lupu, E [1 ]
Sloman, M [1 ]
Stefanelli, C [1 ]
机构
[1] Univ Bologna, Dipartimento Elettron Informat & Sistemist, I-40136 Bologna, Italy
来源
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2000年
关键词
D O I
10.1109/ACSAC.2000.898890
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java technology facilitates dynamic loading of application code from remote servers into heterogeneous clients distributed all over the Internet. However, executing foreign code that has been loaded from the network raises significant security concerns which limit the diffusion of these technologies. Substantial work has already been done to provide security solutions for protecting both hosting nodes and mobile code. For example, the Java security architecture evolved from a rigid sandbox model to a more flexible solution where downloaded code can perform any kind of operations, depending on its source location and signature. However, the most widespread security solutions for MC platforms today do not support the sophisticated security policies required in modern inter-organisational environments. This requires expressive languages to specify the policy and flexible mechanisms for policy implementation which cater for code mobility. This paper shows how access control policies for MC based applications can be specified in a concise and declarative language called Ponder and how these policies can be implemented within the Java security architecture.
引用
收藏
页码:356 / 365
页数:10
相关论文
共 50 条
  • [1] An efficient and flexible access control framework for Java']Java programs in mobile terminals
    Tomimori, H
    Nakamoto, Y
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 777 - 782
  • [2] Flexible Access Control for Java']JavaScript
    Richards, Gregor
    Hammer, Christian
    Nardelli, Francesco Zappa
    Jagannathan, Suresh
    Vitek, Jan
    ACM SIGPLAN NOTICES, 2013, 48 (10) : 305 - 322
  • [3] Classifying Code Comments in Java']Java Mobile Applications
    Pascarella, Luca
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 39 - 40
  • [4] Mobile code security by Java']Java bytecode instrumentation
    Chander, A
    Mitchell, JC
    Shin, I
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
  • [5] Aspectizing Java']Java Access Control
    Toledo, Rodolfo
    Nunez, Angel
    Tanter, Eric
    Noye, Jacques
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2012, 38 (01) : 101 - 117
  • [6] Mobile code security by Java']Java bytecode dependence analysis
    Bian, G
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
  • [7] A distributed access control model for Java']Java
    Molva, R
    Roudier, Y
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 291 - 308
  • [8] Security Enhanced Java']Java: Mandatory Access Control for the Java']Java Virtual Machine
    Venelle, Benjamin
    Briffaut, Jeremy
    Clevy, Laurent
    Toinard, Christian
    2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC), 2013,
  • [9] Application of the Java']Java Message Service in mobile monitoring environments
    Kuehnhausen, Martin
    Frost, Victor S.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1707 - 1716
  • [10] Load time code validation for mobile phone Java']Java Cards
    Gadyatskaya, Olga
    Massacci, Fabio
    Nguyen, Quang-Huy
    Chetali, Boutheina
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (2-3) : 108 - 129