Abstract
Security implies not only protection from external intrusions but also controlling the actions of internal executing entities. It is very important that the security mechanisms of the application be correct and stable; and that the security code should not be mixed with the application code. Security is an added feature defining constraints on object interactions. So it is possible to use the separation of concerns and transparency, typical reflection features, to split a secure system into two levels: the application, and the authorization system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ancona, M., Cazzola, W., Fernandez, E.B. (1998). Reective Authorization Systems. In: Demeyer, S., Bosch, J. (eds) Object-Oriented Technology: ECOOP’98 Workshop Reader. ECOOP 1998. Lecture Notes in Computer Science, vol 1543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49255-0_62
Download citation
DOI: https://doi.org/10.1007/3-540-49255-0_62
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65460-5
Online ISBN: 978-3-540-49255-9
eBook Packages: Springer Book Archive