A flexible access control service for Java']Java mobile code

被引:5
作者
Corradi, A [1 ]
Montanari, R [1 ]
Lupu, E [1 ]
Sloman, M [1 ]
Stefanelli, C [1 ]
机构
[1] Univ Bologna, Dipartimento Elettron Informat & Sistemist, I-40136 Bologna, Italy
来源
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2000年
关键词
D O I
10.1109/ACSAC.2000.898890
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java technology facilitates dynamic loading of application code from remote servers into heterogeneous clients distributed all over the Internet. However, executing foreign code that has been loaded from the network raises significant security concerns which limit the diffusion of these technologies. Substantial work has already been done to provide security solutions for protecting both hosting nodes and mobile code. For example, the Java security architecture evolved from a rigid sandbox model to a more flexible solution where downloaded code can perform any kind of operations, depending on its source location and signature. However, the most widespread security solutions for MC platforms today do not support the sophisticated security policies required in modern inter-organisational environments. This requires expressive languages to specify the policy and flexible mechanisms for policy implementation which cater for code mobility. This paper shows how access control policies for MC based applications can be specified in a concise and declarative language called Ponder and how these policies can be implemented within the Java security architecture.
引用
收藏
页码:356 / 365
页数:10
相关论文
共 50 条
[21]   Mobile code implementation of the RTP protocol in Java']Java: Design choices and evaluation [J].
Gaibisso, C ;
Gambosi, G ;
Lancia, M ;
Martufi, G ;
Mastromartino, EA .
ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, :644-649
[22]   Access Control in Java']JavaScript [J].
Toledo, Rodolfo ;
Tanter, Eric .
IEEE SOFTWARE, 2011, 28 (05) :76-84
[23]   On line monitoring and control of mobile robots using Java']Java [J].
Parma, S. K. ;
Umesh-Babu, S. ;
Madhab, G. B. .
Annals of DAAAM for 2006 & Proceedings of the 17th International DAAAM Symposium: INTELLIGENT MANUFACTURING & AUTOMATION: FOCUS ON MECHATRONICS AND ROBOTICS, 2006, :285-286
[24]   Acknowledging Good Java']Java Code with Code Perfumes [J].
Straubinger, Philipp ;
Obermueller, Florian ;
Fraser, Gordon .
2024 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING, CSEE & T 2024, 2024,
[25]   Mobile Java']Java objects [J].
Hayton, RJ ;
Bursell, MH ;
Donaldson, DI ;
Herbert, AJ .
MIDDLEWARE'98: IFIP INTERNATIONAL CONFERENCE ON DISTRIBUTED SYSTEMS PLATFORMS AND OPEN DISTRIBUTED PROCESSING, 1998, :323-338
[26]   Backporting Java']Java 5 Code [J].
Gutzmann, Tobias ;
Steijger, Tamara .
2009 NINTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2009, :121-122
[27]   Mobile Java']Java objects [J].
Herbert, AJ ;
Hayton, RJ ;
Bursell, M .
BT TECHNOLOGY JOURNAL, 1999, 17 (02) :115-125
[28]   The Java']Java mobile risk [J].
Reynaud-Plantey, Daniel .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (02) :101-107
[29]   Micro patterns in Java']Java code [J].
Gil, J ;
Maman, I .
ACM SIGPLAN NOTICES, 2005, 40 (10) :97-116
[30]   Dynamic code repositioning for Java']Java [J].
Tanaka, S ;
Yamada, T ;
Shiraishi, S .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (07) :1737-1742