skip to main content
10.1145/1960314.1960348acmconferencesArticle/Chapter ViewAbstractPublication PagesmodularityConference Proceedingsconference-collections
abstract

Exploiting modular access control for advanced policies

Authors Info & Claims
Published:21 March 2011Publication History

ABSTRACT

In previous work we successfully modularized the Java access control architecture. The approach consists in expressing access control using restriction aspects scoped with an appropriate scoping strategy. In this work we briefly explore how restriction aspects and scoping strategies make it possible to express novel and useful access control policies in a direct manner.

References

  1. C. Fournet and A. D. Gordon. Stack inspection: theory and variants. ACM Transactions on Programming Languages and Systems (TOPLAS), 25(3):360 -- 399, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Hardy. The confused deputy. SIGOPS Operating Systems Review, 22(4):36--38, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. S. Miller. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, John Hopkins University, Baltimore, Maryland, USA, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems, 1975.Google ScholarGoogle Scholar
  5. P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science, pages 137--196. Springer Berlin / Heidelberg, London, UK, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. É. Tanter. Expressive scoping of dynamically-deployed aspects. In Proceedings of the 7th ACM International Conference on Aspect-Oriented Software Development (AOSD 2008), pages 168--179, Brussels, Belgium, Apr. 2008. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Toledo, A. Núnez, É. Tanter, and J. Noyé. Aspectizing Java Access Control. IEEE Transactions on Software Engineering, 2011. In Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Wallach and E. Felten. Understanding Java stack inspection. In Proceedings of the IEEE Symposium on Security and Privacy, pages 52--63, 1998.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Exploiting modular access control for advanced policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        AOSD '11: Proceedings of the tenth international conference on Aspect-oriented software development companion
        March 2011
        102 pages
        ISBN:9781450306065
        DOI:10.1145/1960314
        • General Chair:
        • Paulo Borba,
        • Program Chair:
        • Shigeru Chiba

        Copyright © 2011 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 March 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • abstract

        Acceptance Rates

        Overall Acceptance Rate41of139submissions,29%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader