期刊文献+

An Access Control Framework for Reflective Middleware 被引量:1

An Access Control Framework for Reflective Middleware
原文传递
导出
摘要 Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems. Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middleware -- PKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity. Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems. Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middleware -- PKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.
作者 黄罡 孙连山
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第6期895-904,共10页 计算机科学技术学报(英文版)
基金 supported by the National Basic Research 973 Program of China under Grant No. 2005CB321805 the National High-Tech Research and Development 863 Program of China under Grant No. 2007AA010301 the National Natural Science Foundation of China under Grant No. 60528006 and the Fok Ying Tung Education Foundation.
关键词 reflective middleware access control J2EE reflective middleware, access control, J2EE
  • 相关文献

参考文献27

  • 1Agha G (ed.). Special Issue on Adaptive Middleware. Communications of ACM, 2002, 45(6): 30-64.
  • 2Blair G S, Coulson G et al. The design and implementation of open ORB 2. IEEE Distributed Systems Online, 2001, 2(6): 1-40.
  • 3Mei H, Huang G. PKUAS: An architecture-based reflective component operating platform (invited paper). In Proc. the 10th IEEE Int. Workshop on Future Trends of Distributed Computing Systems, Kawada S (ed.), Suzhou, IEEE Computer Society, 2004, pp.163-169.
  • 4Smith B C. Procedural reflect, ion in programming languages [Dissertation]. MIT, 1982.
  • 5Yokote Y. The apertos reflective operating system: The concept and its implementation. In Proc. Conference on Object- Oriented Programming Systems Languages and Applications (OOPSLA'92), Vancouver, Canada, ACM SIGPLAN Notices, ACM Press, 1992, 27(10): 414-434.
  • 6McAffer J. The CodA MOP. In Proc. Workshop on Object- Oriented Reflection and Metalevel Architectures, Washington DC, USA, 1993. ACM.
  • 7Ledoux T. OpenCorba: A reflective open broker. In Proc. the 2nd International Conference on Reflection, Saint-Malo, France, LNCS 1616, Heidelberg: Springer-Verlag, 1999, pp.197-214.
  • 8Maes P. Concepts and experiments in computational reflection. In Proe. ACM Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA'87), Orlando, FL, USA, October 1987, pp.147 155.
  • 9Vimercatil S, Paraboschi S, Samaratil P. Access control: Principles and solutions. Software Practice and Experience, 2003, 33(5): 397-421.
  • 10Java 2 Platform Enterprise Edition Specification. Version 1.3, SUN Microsystems, 2001.

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部