Abstract | ||
---|---|---|
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a developer) annotates methods, interfaces, and classes with roles. Our system automatically creates proxy objects which only contain methods to which a client is authorized access based on the role specifications. Potentially untrusted clients that use Remote Method Invocation (RMI) then receive proxy objects rather than the originals. We discuss the method annotation process, the semantics of annotations, how we derive proxy objects based on annotations, and how RMI clients invoke methods via proxy objects. We present the advantages to our approach, and distinguish it from existing approaches to method-granularity access control in Java. We demonstrate empirical evidence of the effectiveness of our approach by discussing its application to software projects that range from thousands to hundreds of thousands of lines of code. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1145/1809842.1809858 | SACMAT |
Keywords | Field | DocType |
rmi client,role-based access control,method annotation process,java programming language,annotates method,access control,proxy object,remote method invocation,new approach,empirical evidence,role based access control,rbac,java,lines of code | Proxy pattern,Annotation,Java annotation,Computer science,Computer security,Java concurrency,Role-based access control,Access control,Java,Database,Source lines of code | Conference |
Citations | PageRank | References |
6 | 0.49 | 11 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jeff Zarnett | 1 | 7 | 0.86 |
Mahesh V. Tripunitara | 2 | 558 | 33.06 |
Patrick Lam | 3 | 636 | 38.73 |