Abstract
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of network resources and extensibility of information servers. However, since they cross administrative domains, they have the ability to access and possibly misuse a host’s protected resources. In this paper, we present a novel approach for controlling and protecting a site’s resources. In this approach, a site uses a declarative policy language to specify a set of constraints on accesses to resources. A set of code transformation tools enforces these constraints on mobile programs by integrating the access constraint checking code directly into the mobile program and resource definitions. Because our approach does not require resources to make explicit calls to a reference monitor, it does not depend upon a specific runtime system implementation.
★
This work is supported by the Defense Advanced Research Project Agency (DARPA) and Rome Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-97-1-0221. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense Advanced Research Project Agency (DARPA), Rome Laboratory, or the U.S. Government.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E. Amoroso. Fundamentals of Computer Security Technology. P T R Prentice Hall, 1994.
K. Arnold and J. Gosling. The Java Programming Language. Addison Wesley, 1996.
D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik. Itinerant Agents for Mobile Computing. IEEE Personal Communications, pages 34–49, October 1995.
D. Chess, C. Harrison, and A. Kershenbaum. Mobile agents: Are they a good idea? In Jan Vitek and Christian Tschudin, editors, Mobile Object Systems. Towards the Programmable Internet. Second International Workshop, MOS’ 96, number 1222 in Lecture Notes in Computer Science, pages 25–47, Linz, Austria, July 1997. Springer-Verlag. Also available at http://www.research.ibm.com/massdist/mobag.ps.
Laurence Cholvy and Frédéric Cuppens. Analyzing consistency of security policies. In 1997 IEEE Symposium on Security and Privacy, pages 103–112, Oakland, California, 1997. IEEE.
T. Coombs, J. Coombs, and D. Brewer. ActiveX Sourcebook: Build an ActiveXBased Web Site. John Wiley & Sons, Inc., 1996.
Fréedéeric Cuppens and Claire Saurel. Specifying a security policy: A case study. In 9th IEEE Compuer Security Foundations Workshop, pages 123–134, Kenmare, Ireland, June 1996. IEEE, IEEE Comput. Soc. Press.
D. Denning and P.J. Denning. Certification of Programs for Secure Information Flow. In Communcations of the ACM, volume 20(7), pages 504–513. ACM, 1977.
D. Evans and A. Twyman. Flexible policy-directed code safety. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1999.
J.S. Fritzinger and M. Mueller. Java Security. JavaSoft White Paper, 1996. http://www.javasoft.com/security/whitepaper.ps.
J.A. Goguen and J. Meseguer. Security policies and security models. In In Proceedings of the 1982 Symposium on Security and Privacy, pages 11–20, 1982.
L. Gong. Java security: Present and near future. IEEE Micro, pages 14–19, May/June 1997.
L. Gong, M. Mueller., H. Prafullchandra, and R. Schemers. Going beyong the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, December 1997.
R. Grimm and B.N. Bershad. Providing policy-neutral and transparent access control in extensible systems. Technical Report UW-CSE-98-02-02, Dept. of Computer Science and Engineering, University of Washington, 1998.
S. Gritzalis and G. Aggelis. Security issues surrounding programming languages for mobile code: Java vs. Safe-Tcl. Operating Systems Review, 32(2):16–32, April 1998.
D. Hagimont and L. Ismail. A protection scheme for mobile agents on Java. In Mobicom’ 97, pages 215–222, Budapest, Hungary, 1997. ACM.
M.A. Harrison, W.L. R., and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461–471, August 1976.
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461–471, 1976.
C. Hawblitzel, C. Chang, G. Czajkowski, D. Hu, and T. von Eicken. Implementing multiple protection domains in Java. Technical Report 97-1160, Cornell University, 1997.
N. Islam, R. Anand, T. Jaeger, and J.R. Rao. A flexible security model for using internet content. IEEE Software, 14(5):52–59, Sept.–Oct. 1997.
S. Jajodia, S. Pierangela, and V.S. Subrahmanian. A logical language for expressing authorizations. In Proceedings of the 1997 Symposium on Security and Privacy, pages 31–42, 1997.
JavaSoft. JDK 1.1.1 Documentation.
D. Kotz, R. Gray, S. Nog, D. Rus, S. Chawla, and G. Cybenko. Agent Tcl: Targeting the needs of mobile computers. IEEE Internet Computing, 1(4):58–67, July–August 1997.
S. Liang and G. Brach. Dynamic Class Loading in the Java Virtual Machine. In C. Chambers, editor, Object-Oriented Programming Systems, Languages and Applications Conference, in Special Issue of SIGPLAN Notices, number 10, Vancouver, October 1998. ACM.
J. Meyer and T. Downing. Java Virtual Machine. O’Reilly, 1997.
D.V. Miller and R.W. Baldwin. Access control by boolean expression evaluation. In Fifth Annual Computer Security Applications Conference, pages 131–139, Tucson, AZ, 1990. IEEE, IEEE Comput. Soc. Press.
D.V. Miller and R.W. Baldwin. Access control by boolean expression evaluation. In Fifth Annual Computer Security Applications Conference, pages 131–139, Tucson, AZ, 1990. IEEE, IEEE Comput. Soc. Press.
N. Nagaratnam and S.B. Byrne. Resource access control for an internet user agent. In Third USENIX Conference on Object-Oriented Technologies and Systems. USENIX, June 1997.
G.C. Necula. Proof-carrying code. In Proceedings of the 24th Annual Symposium on Principles of Programming Languages. ACM SIGPLAN-SIGACT, Jan. 1997.
G.C. Necula and P. Lee. Safe kernel extensions without run-time checking. In Second Symposium on Operating System Design and Implementations. Usenix, Oct. 1996.
L.M. Null and J. Wong. The DIAMOND security policy for object-oriented databases. In 1992 ACM Computer Science Conference. Communications Proceedings, pages 49–56, Kansas City, MO, 1992.
J.K. Ousterhout, J.Y. Levy, and B.B. Welch. The Safe-Tcl security model. Technical Report TR-97-60, Sun Microsystem Laboratories, 1997. Available at http://research.sun.com/technical-reports/1997/abstract-60.html.
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278–1308, September 1975.
J.W. Stamos and D.K. Gifford. Remote Evaluation. ACM Transactions on Programming Languages and Systems, 12(4):537–565, October 1990.
T. Thorn. Programming languages for mobile code. ACM Computing Surveys, 29(3):213–239, September 1997.
D.S. Wallach, D. Balfanz, D. Dean, and E.W. Felten. Extensible security architecture for Java. Technical report, Department of Computer Science, Princeton University, 1997.
T.Y.C. Woo and S.S. Lam. Authorization in distributed systems: A formal approach. In Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pages 33–50, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pandey, R., Hashii, B. (1999). Providing Fine-Grained Access Control for Java Programs. In: Guerraoui, R. (eds) ECOOP’ 99 — Object-Oriented Programming. ECOOP 1999. Lecture Notes in Computer Science, vol 1628. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48743-3_21
Download citation
DOI: https://doi.org/10.1007/3-540-48743-3_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66156-6
Online ISBN: 978-3-540-48743-2
eBook Packages: Springer Book Archive