A flexible access control service for Java']Java mobile code

被引:5
作者
Corradi, A [1 ]
Montanari, R [1 ]
Lupu, E [1 ]
Sloman, M [1 ]
Stefanelli, C [1 ]
机构
[1] Univ Bologna, Dipartimento Elettron Informat & Sistemist, I-40136 Bologna, Italy
来源
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2000年
关键词
D O I
10.1109/ACSAC.2000.898890
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java technology facilitates dynamic loading of application code from remote servers into heterogeneous clients distributed all over the Internet. However, executing foreign code that has been loaded from the network raises significant security concerns which limit the diffusion of these technologies. Substantial work has already been done to provide security solutions for protecting both hosting nodes and mobile code. For example, the Java security architecture evolved from a rigid sandbox model to a more flexible solution where downloaded code can perform any kind of operations, depending on its source location and signature. However, the most widespread security solutions for MC platforms today do not support the sophisticated security policies required in modern inter-organisational environments. This requires expressive languages to specify the policy and flexible mechanisms for policy implementation which cater for code mobility. This paper shows how access control policies for MC based applications can be specified in a concise and declarative language called Ponder and how these policies can be implemented within the Java security architecture.
引用
收藏
页码:356 / 365
页数:10
相关论文
共 50 条
[41]   Securing Java']Java-Based mobile agents through byte code obfuscation techniques [J].
Shah, Syed Waqar ;
Nixon, P. ;
Ferguson, R. I. ;
Hassnain, Syed Riaz ul ;
Arbab, M. Naeem ;
Khan, Laiq .
10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS, 2006, :305-+
[42]   Flexible metaprogramming and AOP in Java']Java [J].
Tanter, Eric ;
Toledo, Rodolfo ;
Pothier, Guillaume ;
Noye, Jacques .
SCIENCE OF COMPUTER PROGRAMMING, 2008, 72 (1-2) :22-30
[43]   Java']Java access to numerical libraries [J].
Casanova, H ;
Dongarra, J ;
Doolin, DM .
CONCURRENCY-PRACTICE AND EXPERIENCE, 1997, 9 (11) :1279-1291
[44]   Access rights analysis for Java']Java [J].
Koved, L ;
Pistoia, M ;
Kershenbaum, A .
ACM SIGPLAN NOTICES, 2002, 37 (11) :359-372
[45]   A scalable location aware service platform for mobile applications based on Java']Java RMI [J].
Droegehorn, O ;
Singh-Kurbel, K ;
Franz, M ;
Sorge, R ;
Winkler, R ;
David, K .
TRENDS IN DISTRIBUTED SYSTEMS: TOWARDS A UNIVERSAL SERVICE MARKET, 2000, 1890 :296-301
[46]   Signalling integer overflows in Java']Java - A tool for checking overflows in Java']Java code [J].
Bapst, Frederic ;
Kilchoer, Francois .
DR DOBBS JOURNAL, 2008, 33 (09) :54-58
[47]   Minimizing Impact on Java']Java Virtual Machine via JAVA']JAVA Code Optimization [J].
Myalapalli, Vamsi Krishna ;
Geloth, Sunitha .
2015 INTERNATIONAL CONFERENCE ON ENERGY SYSTEMS AND APPLICATIONS, 2015, :19-24
[48]   Java']Java core permits direct Java']Java byte-code execution [J].
Vollmer, A .
ELECTRONIC DESIGN, 2000, 48 (22) :30-+
[49]   On Access Restriction with Java']Java Wildcards [J].
Viroli, Mirko ;
Rimassa, Giovanni .
JOURNAL OF OBJECT TECHNOLOGY, 2005, 4 (10)
[50]   Mobile agents and Java']Java mobile agents toolkits [J].
Horvat, D ;
Cvetkovic, D ;
Milutinovic, V ;
Kocovic, P ;
Kovacevic, V .
TELECOMMUNICATION SYSTEMS, 2001, 18 (1-3) :271-287