A flexible access control service for Java']Java mobile code

被引:5
作者
Corradi, A [1 ]
Montanari, R [1 ]
Lupu, E [1 ]
Sloman, M [1 ]
Stefanelli, C [1 ]
机构
[1] Univ Bologna, Dipartimento Elettron Informat & Sistemist, I-40136 Bologna, Italy
来源
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2000年
关键词
D O I
10.1109/ACSAC.2000.898890
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java technology facilitates dynamic loading of application code from remote servers into heterogeneous clients distributed all over the Internet. However, executing foreign code that has been loaded from the network raises significant security concerns which limit the diffusion of these technologies. Substantial work has already been done to provide security solutions for protecting both hosting nodes and mobile code. For example, the Java security architecture evolved from a rigid sandbox model to a more flexible solution where downloaded code can perform any kind of operations, depending on its source location and signature. However, the most widespread security solutions for MC platforms today do not support the sophisticated security policies required in modern inter-organisational environments. This requires expressive languages to specify the policy and flexible mechanisms for policy implementation which cater for code mobility. This paper shows how access control policies for MC based applications can be specified in a concise and declarative language called Ponder and how these policies can be implemented within the Java security architecture.
引用
收藏
页码:356 / 365
页数:10
相关论文
共 50 条
[31]   Dynamic code repositioning for Java']Java [J].
Tanaka, S ;
Yamada, T ;
Shiraishi, S .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (07) :1737-1742
[32]   JCCAP: Capability-based access control for Java']Java Card [J].
Hagimont, D ;
Vandewalle, JJ .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 2000, 52 :365-388
[33]   Java']Java Message Service [J].
Bruno, Eric J. .
DR DOBBS JOURNAL, 2007, 32 (08) :30-+
[34]   Providing fine-grained access control for Java']Java programs [J].
Pandey, R ;
Hashii, B .
ECOOP'99 - OBJECT-ORIENTED PROGRAMMING, 1999, 1628 :449-473
[35]   Role-based access control on the web using Java']Java™ [J].
Giuri, L .
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, :11-18
[36]   Mobile device access control: an improved correlation based face authentication scheme and its Java']Java ME application [J].
Xi, Kai ;
Hu, Jiankun ;
Han, Fengling .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10) :1066-1085
[37]   A Java']Java-based Middleware for Control and Sensing in Mobile Robotics [J].
Hellstrom, Thomas ;
Johansson, Thomas ;
Ringdahl, Ola .
WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, :649-654
[38]   Java']JavaML: a markup language for Java']Java source code [J].
Badros, GJ .
COMPUTER NETWORKS, 2000, 33 (1-6) :159-177
[39]   Generating Control Flow Graph from Java']Java Card Byte Code [J].
Amine, Achkar ;
Mohammed, Benattou ;
Jean-Louis, Lanet .
2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, :206-212
[40]   A Comparative Analysis of Static Code Analysis Tools that check Java']Java Code Adherence to Java']Java Coding Standards [J].
Ashfaq, Qirat ;
Khan, Rimsha ;
Farooq, Sehrish .
2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, :98-103