Title
Using self-defending objects to develop security aware applications in Java™
Abstract
The self defending object (SDO) approach to the development of security aware applications represents a change in the object oriented paradigm, whereby the software objects that encapsulate sensitive data or provide security sensitive functionality are responsible for its protection. Such an approach aims at defining and testing new concepts related to the growing requirements for information assurance in information systems. It involves a shift in the way in which application developers look at objects. Rather than acting as containers and dispensers of data, software objects become actively responsible for the protection of that data. By basing the design of security aware applications on the SDO concept, the provision of application specific, user centric, access control is simplified. When using the SDO approach, the access control mechanisms are localized within those objects that encapsulate sensitive data and functionality rather than being distributed throughout the application. Consequently, security measures are consistently applied and are not bypassable.The major contribution of this paper is to discuss how the SDO concept that was introduced in (Holford, Caelli & Rhodes 2003), can be used in the development of security aware applications. It begins by briefly presenting the rationale behind the SDO concept and its applicability to software design. It continues with a discussion of the experiences gained from using the SDO concept in the development of prototype security aware applications in the Java™ language and concludes by outlining future work aimed at extending the concept to the provision of 'self defending' software components and finding solutions for the trusted deployment of such components.
Year
Venue
Keywords
2004
ACSC
software component,security measure,sensitive data,software object,self-defending object,sdo concept,sdo approach,new concept,prototype security aware application,security sensitive functionality,security aware application,software design,computer security,access control,information system,object oriented,application development,security architecture
Field
DocType
Citations 
Information assurance,Software design,Software deployment,Object-oriented programming,Computer security,Software security assurance,Access control,Component-based software engineering,Engineering,Enterprise information security architecture
Conference
5
PageRank 
References 
Authors
0.61
3
3
Name
Order
Citations
PageRank
John W. Holford150.94
William J. Caelli211358.16
Anthony W. Rhodes350.61