Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Programmable access control
Hale J., Papa M., Shenoi S. Journal of Computer Security11 (3):331-351,2003.Type:Article
Date Reviewed: Nov 14 2003

Protection models and security application programming interfaces (APIs) that constitute the state of the art for safeguarding Internet applications prove their limits for fine-grained configurable security policies, and do not ensure the consistency of a given policy implementation across a heterogeneous environment.

Programmable security provides syntactic and semantic constructs in programming languages for systematically embedding security functionality within applications. This paper presents a methodology for extending programming languages with programmable security services, and a secure coordination supporting interoperability in open environments.

Section 1 introduces the topic, and section 2 describes programmable security and related work. The authors chose a ticket-based authorization model (section 3), and section 4 describes the prototype implementation: a Java package that can be seamlessly integrated within native Java applications. The same principles can be applied to a coordination language whose purpose is to enable secure interoperability in open environments. Section 5 explores Mumbo, a secure coordination language for integrating legacy code and heterogeneous objects under a single authorization service, and section 6 concludes the paper.

Reviewer:  Pierre Radulescu-Banu Review #: CR128569 (0404-0455)
Bookmark and Share
 
Frameworks (D.3.3 ... )
 
 
Java (D.3.2 ... )
 
 
Protection Mechanisms (D.2.0 ... )
 
 
General (D.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Frameworks": Date
On the application of UML to designing on-line business model
Park Y., Kim S. In UML and the unified process. Hershey, PA: Idea Group Publishing, 2003. Type: Book Chapter
Feb 26 2004
A framework for evaluating privacy preserving data mining algorithms
Bertino E., Fovino I., Provenza L. Data Mining and Knowledge Discovery 11(2): 121-154, 2005. Type: Article
Apr 18 2007
Pro Apache Struts with Ajax
Carnell J., Harrop R., Mittal K., Apress, Berkeley, CA, 2006.  528, Type: Book (9781590597385)
Jan 26 2007
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy