A Simple Security-Aware MOP for Java

作者: Denis Caromel , Fabrice Huet , Julien Vayssière

DOI: 10.1007/3-540-45429-2_9

关键词: CPU cacheImplementationMetaobjectJavaComputer scienceSoftware developmentOperating systemProxy (statistics)Programming language

摘要: This article investigates the security problems raised by use of proxy-based runtime meta-object protocols (MOPs) for Java and provides an approach making meta-level code transparent to base-level code, security-wise. We prove that, but giving all permissions only kernel MOP using Java's built-in mechanism propagating contexts, required do not interfere. illustrate this result in context a simple that we wrote.

参考文章(10)
Luiz Eduardo Buzato, Alexandre Oliva, The design and implementation of Guaraná usenix conference on object oriented technologies and systems. pp. 15- 15 ,(1999)
Shigeru Chiba, Michiaki Tatsubori, Yet Another java.lang.Class european conference on object-oriented programming. pp. 372- 373 ,(1998) , 10.1007/3-540-49255-0_107
Denis Caromel, Julien Vayssière, Reflections on MOP s, Components, and Java Security ECOOP 2001 — Object-Oriented Programming. pp. 256- 274 ,(2001) , 10.1007/3-540-45337-7_14
Ian Welch, Robert Stroud, From Dalang to Kava - The Evolution of a Reflective Java Extension Lecture Notes in Computer Science. pp. 2- 21 ,(1999) , 10.1007/3-540-48443-4_2
J. Kleinoder, M. Golm, MetaJava: an efficient run-time meta architecture for Java/sup TM/ international workshop on object orientation in operating systems. pp. 54- 61 ,(1996) , 10.1109/IWOOOS.1996.557866
J. Ferber, Computational reflection in class based object-oriented languages Conference proceedings on Object-oriented programming systems, languages and applications - OOPSLA '89. ,vol. 24, pp. 317- 326 ,(1989) , 10.1145/74877.74910
Massimo Ancona, Walter Cazzola, Eduardo B. Fernandez, Reflective authorization systems: possibilities, benefits, and drawbacks Secure Internet programming. pp. 35- 49 ,(2001) , 10.1007/3-540-48749-2_3
Ian Welch, Robert J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code european symposium on research in computer security. pp. 309- 323 ,(2000) , 10.1007/10722599_19