Providing fine-grained access control for Java']Java programs via binary editing

被引:0
|
作者
Pandey, R [1 ]
Hashii, B [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Parallel & Distributed Comp Lab, Davis, CA 95616 USA
来源
CONCURRENCY-PRACTICE AND EXPERIENCE | 2000年 / 12卷 / 14期
关键词
security; policy; mobile code; access control; !text type='Java']Java[!/text; object orientation; binary editing;
D O I
10.1002/1096-9128(20001210)12:14<1405::AID-CPE515>3.0.CO;2-O
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There is considerable interest in programs that can migrate from one host to another and execute, Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host's protected resources. In this paper, we present a novel approach for controlling and protecting a site's resources. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to resources, A set of code transformation tools enforces these constraints on mobile programs by integrating the access constraint checking code directly into the mobile program and resource definitions, Using this approach, a site does not need to explicitly include calls to reference monitors in order to protect resources. The performance analysis show that the approach performs better than reference monitor-based approaches in many cases. Copyright (C) 2000 John Wiley & Sons, Ltd.
引用
收藏
页码:1405 / 1430
页数:26
相关论文
共 50 条
  • [1] Providing fine-grained access control for Java']Java programs
    Pandey, R
    Hashii, B
    [J]. ECOOP'99 - OBJECT-ORIENTED PROGRAMMING, 1999, 1628 : 449 - 473
  • [2] Towards Fine-Grained Access Control in Java']JavaScript Contexts
    Patil, Kailas
    Dong, Xinshu
    Li, Xiaolei
    Liang, Zhenkai
    Jiang, Xuxian
    [J]. 31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 720 - 729
  • [3] Efficient support of fine-grained futures in Java']Java
    Zhang, Lingli
    Krintz, Chandra
    Soman, Sunil
    [J]. PROCEEDINGS OF THE 18TH IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2006, : 175 - +
  • [4] Historage: Fine-grained version control system for Java
    Hata, Hideaki
    Mizuno, Osamu
    Kikuno, Tohru
    [J]. IWPSE-EVOL'11 - Proceedings of the 12th International Workshop on Principles on Software Evolution, 2011, : 96 - 100
  • [5] Fine-grained parallelism in probabilistic parsing with Habanero Java']Java
    Francis-Landau, Matthew
    Xue, Bing
    Eisner, Jason
    Sarkar, Vivek
    [J]. PROCEEDINGS OF 2016 6TH WORKSHOP ON IRREGULAR APPLICATIONS: ARCHITECTURE AND ALGORITHMS (IA3), 2016, : 78 - 81
  • [6] DET-ABE: A Java']Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption
    Morales-Sandoval, Miguel
    Diaz-Perez, Arturo
    [J]. INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 104 - 119
  • [7] Consistency Validation Method for Java']Java Fine-Grained Lock Refactoring
    Zhang, Yang
    Li, Chunxia
    Bai, Yu
    [J]. IEEE ACCESS, 2021, 9 : 149287 - 149301
  • [8] Fine-grained information flow analysis and enforcement in a Java']Java virtual machine
    Chandra, Deepak
    Franz, Michael
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 463 - 474
  • [9] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices
    Ion, Iulia
    Dragovic, Boris
    Crispo, Bruno
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
  • [10] Fine-Grained Map Coloring Web Service for Java']JavaScript
    Nakai, Tetsuya
    Saiki, Sachio
    Nakamura, Masahide
    [J]. DIGITAL HUMAN MODELING AND APPLICATIONS IN HEALTH, SAFETY, ERGONOMICS AND RISK MANAGEMENT. HUMAN COMMUNICATION, ORGANIZATION AND WORK, DHM 2020, PT II, 2020, 12199 : 159 - 174