skip to main content
10.1145/1141277.1141645acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Policy-driven reflective enforcement of security policies

Published:23 April 2006Publication History

ABSTRACT

Practical experience has shown that separating security enforcement code from functional code using separation of concerns techniques such as behavioural reflection leads to improvements in code undestandability and maintainability. However, using these techniques at requires providing a consistent and declarative way to specify policies. We have developed a prototype tool that allows the use of Ponder policies that are enforced by the Kava metaobject protocol. This prototype translates high-level policies into configuration files used to enforce the policies upon Java applications.

References

  1. C. A., R. Montanari, E. Lupu, M. Sloman, and C. Stefanelli. A flexible access control service for Java mobile code. In Annual Computer Security Applications Conference, pages 356--365, New Orleans, Louisiana, USA, 2000. IEEE.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In POLICY '01: Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pages 18--38, London, UK, 2001. Springer-Verlag.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Evans and A. Twyman. Flexible policy-directed code safety. In IEEE Symposium on Research in Security and Privacy, pages 32--45, Oakland, CA, May 1999. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Gong, M. Mueller, H. Prafullchandra, and S. R. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103--112, Monterey, California, December 1997. USENIX, Berkeley, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Gosling, B. Joy, and G. L. Steele. The Java Language Specification. The Java Series. Addison-Wesley, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In ECOOP 2001. volume LNCS 2072, pages 327--353, Budapest, Hungary, 2001. Springer.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. T., K. S., Y. W., and C. Robbins. The string representation of standard attribute syntaxes. Internet Engineering Task Force. Available from: http://www.ietf.org/rfc/rfc1778.txt.Mar 1995. {Accessed February 2003}.]]Google ScholarGoogle Scholar
  8. J. von Nieda. Lirc -- an IRC client for Java. http://www.vonnieda.org/Lirc, 2001. Last accessed 17/6/02.]]Google ScholarGoogle Scholar
  9. I. Welch and R. Stroud. Re-engineering security as a crosscutting concern -- experience with a third party application. The Computer Journal, 46(5):578--589, September 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. I. Welch and R. J. Stroud. Kava -- using byte-code rewriting to add behavioral reflection to Java. In Proceedings of COOTS 2001, USENIX Conference on Object-Oriented Technologies and Systems, pages 119--130, San Antonio, Texas, 29 January - 2 February 2001. USENIX, Berkeley, CA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies on compiled code. Journal of Computer Security, 10:399--432, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Policy-driven reflective enforcement of security policies

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
      April 2006
      1967 pages
      ISBN:1595931082
      DOI:10.1145/1141277

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 April 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader