An operational semantics of Java']Java 2 access control

被引:5
|
作者
Karjoth, G [1 ]
机构
[1] IBM Corp, Zurich Res Lab, Zurich, Switzerland
关键词
D O I
10.1109/CSFW.2000.856939
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Java 2 Security enhanced with Java Authentication and Authorization Service (JAAS) provide sophisticated access control features via a user-configurable authorization policy. Fine-grained access control, code-based as well as user-based authorization, and implicit access rights allow the implementation of real-world policies, but of the cost of increased complexity. In this paper we provide a formal specification of the Java 2 and JAAS access control model that helps remove ambiguities of the informal definitions. It defines Java 2 access control in terms of an abstract machine, whose behavior is determined by a small set of transition rules. we illustrate the power of Java 2 access control by showing how commonly encountered authorization requirements can be implemented in Java 2.
引用
收藏
页码:224 / 232
页数:3
相关论文
共 50 条
  • [1] Extending operational semantics of the Java']Java bytecode
    Czarnik, Patryk
    Schubert, Aleksy
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 57 - 72
  • [2] Structural Operational Semantics of Packages in Java']Java
    Al Farook, Abdullah
    Arefin, Mohammad Shamsul
    Hoque, Md. Moshiul
    2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 563 - 568
  • [3] Operational semantics of the Java']Java Card Virtual Machine
    Siveroni, IA
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 58 (1-2): : 3 - 25
  • [4] An Operational Semantics for Java']JavaScript
    Maffeis, Sergio
    Mitchell, John C.
    Taly, Ankur
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5356 : 307 - +
  • [5] A compositional operational semantics for Java']JavaMT
    Abrahám, E
    de Boer, RS
    de Roever, WP
    Steffen, M
    VERIFICATION: THEORY AND PRACTICE: ESSAYS DEDICATED TO ZHOAR MANNA ON THE OCCASION OF HIS 64TH BIRTHDAY, 2003, 2772 : 290 - 303
  • [6] Aspectizing Java']Java Access Control
    Toledo, Rodolfo
    Nunez, Angel
    Tanter, Eric
    Noye, Jacques
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2012, 38 (01) : 101 - 117
  • [7] Operational semantics of the Java Card Virtual Machine
    Siveroni, Igor A.
    J. Logic. Algebraic Program., 1-2 (3-25):
  • [8] A distributed access control model for Java']Java
    Molva, R
    Roudier, Y
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 291 - 308
  • [9] Security Enhanced Java']Java: Mandatory Access Control for the Java']Java Virtual Machine
    Venelle, Benjamin
    Briffaut, Jeremy
    Clevy, Laurent
    Toinard, Christian
    2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC), 2013,
  • [10] K-Java']Java: A Complete Semantics of Java']Java
    Bogdanas, Denis
    Rosu, Grigore
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 445 - 456