学位论文详细信息
Method-Specific Access Control in Java via Proxy Objects using Annotations
Access Control;Java;Proxy Object;Annotation;Security;Electrical and Computer Engineering
Zarnett, Jeffrey
University of Waterloo
关键词: Access Control;    Java;    Proxy Object;    Annotation;    Security;    Electrical and Computer Engineering;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/5054/1/jzarnett-thesis.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】
Partially restricting access to objects enables system designers to finely control the security of their systems. We propose a novel approach that allows granting partial access at method granularity on arbitrary objects to remote clients, using proxy objects.Our initial approach considers methods to be either safe (may be invoked by anyone) or unsafe (may be invoked only by trusted users). We next generalize this approach by supporting Role-Based Access Control (RBAC) for methods in objects. In our approach, a policy implementer annotates methods, interfaces, and classes with roles.Our system automatically creates proxy objects for each role, which contain only methods to which that role is authorized.This thesis explains the method annotation process, the semantics of annotations,how we derive proxy objects based on annotations, and how clients invokemethods via proxy objects. We present the advantages to our approach, anddistinguish it from existing approaches to method-granularity access control. We provide detailed semantics of our system, in First Order Logic, to describe its operation.We have implemented our system in the Java programming language and evaluated its performance and usability. Proxy objects have minimal overhead: creation of a proxy object takes an order of magnitude less time than retrieving a reference to a remote object. Deriving the interface---a one-time cost---is on the same order as retrieval. We present empirical evidence of the effectiveness of our approach bydiscussing its application to software projects that range from thousands to hundreds of thousands of lines of code; even large software projects can be annotated in less than a day.
【 预 览 】
附件列表
Files Size Format View
Method-Specific Access Control in Java via Proxy Objects using Annotations 3023KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:64次