{"title":"Providing fine-grained access control for Java programs via binary editing","authors":"R. Pandey, Brant Hashii","doi":"10.1002/1096-9128(20001210)12:14%3C1405::AID-CPE515%3E3.0.CO;2-O","DOIUrl":null,"url":null,"abstract":"SUMMARY There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host’s protected resources. In this paper, we present a novel approach for controlling and protecting a site’s resources. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to resources. A set of code transformation tools enforces these constraints on mobile programs by integrating the access constraint checking code directly into the mobile program and resource definitions. Using this approach, a site does not need to explicitly include calls to reference monitors in order to protect resources. The performance analysis show that the approach performs better than reference monitor-based approaches in many cases. Copyright © 2000 John Wiley & Sons, Ltd.","PeriodicalId":199059,"journal":{"name":"Concurr. Pract. Exp.","volume":"40 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"59","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurr. Pract. Exp.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/1096-9128(20001210)12:14%3C1405::AID-CPE515%3E3.0.CO;2-O","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 59
通过二进制编辑为Java程序提供细粒度的访问控制
人们对能够从一台主机迁移到另一台主机并能执行的程序非常感兴趣。移动程序之所以具有吸引力,是因为它们支持网络资源的有效利用和信息服务器的可扩展性。但是,由于它们跨越管理域,因此它们有能力访问并可能滥用主机受保护的资源。在本文中,我们提出了一种控制和保护站点资源的新方法。在这种方法中,站点使用声明性策略语言来指定对资源访问的一组约束。一组代码转换工具通过将访问约束检查代码直接集成到移动程序和资源定义中来对移动程序实施这些约束。使用这种方法,站点不需要显式地包括对引用监视器的调用,以保护资源。性能分析表明,在许多情况下,该方法的性能优于参考的基于监视器的方法。版权所有©2000约翰威利父子有限公司
本文章由计算机程序翻译,如有差异,请以英文原文为准。