An operational semantics of Java']Java 2 access control

被引:5
|
作者
Karjoth, G [1 ]
机构
[1] IBM Corp, Zurich Res Lab, Zurich, Switzerland
关键词
D O I
10.1109/CSFW.2000.856939
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Java 2 Security enhanced with Java Authentication and Authorization Service (JAAS) provide sophisticated access control features via a user-configurable authorization policy. Fine-grained access control, code-based as well as user-based authorization, and implicit access rights allow the implementation of real-world policies, but of the cost of increased complexity. In this paper we provide a formal specification of the Java 2 and JAAS access control model that helps remove ambiguities of the informal definitions. It defines Java 2 access control in terms of an abstract machine, whose behavior is determined by a small set of transition rules. we illustrate the power of Java 2 access control by showing how commonly encountered authorization requirements can be implemented in Java 2.
引用
收藏
页码:224 / 232
页数:3
相关论文
共 50 条
  • [41] The Equivalence of Reduction and Translation Semantics of Java']Java Simple Closures
    Bellia, Marco
    Occhiuto, M. Eugenia
    FUNDAMENTA INFORMATICAE, 2012, 119 (3-4) : 249 - 264
  • [42] Capabilities for Java']Java: Secure Access to Resources
    Hayes, Ian J.
    Wu, Xi
    Meinicke, Larissa A.
    PROGRAMMING LANGUAGES AND SYSTEMS (APLAS 2017), 2017, 10695 : 67 - 84
  • [43] Java']Java access protection through typing
    Rose, E
    Rose, KH
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2001, 13 (13): : 1125 - 1132
  • [44] Extending Java for package based access control
    Center for Information Security, Department of Computer Science, Keplinger Hall, University of Tulsa, Tulsa
    OK
    74104, United States
    Proceedings - Annual Computer Security Applications Conference, ACSAC, 2000, 2000-January : 67 - 76
  • [45] Semantics of Asynchronous Java']JavaScript
    Loring, Matthew C.
    Marron, Mark
    Leijen, Daan
    ACM SIGPLAN NOTICES, 2017, 52 (11) : 51 - 62
  • [46] Generation of Role Based Access Control Security Policies for Java']Java Collaborative Applications
    Briffaut, J.
    Kauffmann-Tourkestansky, X.
    Lalande, J. -F.
    Smari, W. W.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 224 - +
  • [47] Non-functional capability-based access control in the Java']Java environment
    Hagimont, D
    De Palma, NE
    OBJECT-ORIENTED INFORMATION SYSTEMS, PROCEEDINGS, 2002, 2425 : 323 - 335
  • [48] Sam Dog: A Java']Java Sandbox Using a Cascading Access Control List Approach
    Teixeira, F. C.
    Santana, M. J.
    Santana, R. H. C.
    Bruschi, S. M.
    Estrella, J. C.
    2011 20TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2011, : 134 - 136
  • [49] Using access control for secure information flow in a Java']Java-like language
    Banerjee, A
    Naumann, DA
    16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 155 - 169
  • [50] Improving the OI in process control using Java']Java-enhanced integration and access
    Lubinski, T
    Bhayani, P
    CONTROL SOLUTIONS, 2001, 74 (02): : 87 - 88