Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Implementing a modular access control service to support application-specific policies in CaesarJ
Verhanneman T., Piessens F., De Win B., Truyen E., Joosen W.  Aspect-oriented middleware development (Proceedings of the 1st Workshop on Aspect Oriented Middleware Development, Grenoble, France, Nov 28-Dec 2, 2005)Article 5 2005.Type:Proceedings
Date Reviewed: Jun 1 2006

This paper describes a novel programming method for inserting a modular access control mechanism. It seems to be an attractive approach to reducing or eliminating traditional hardcoding of application access control logic. A new programming language construct called family polymorphism is highlighted as it is implemented in CaesarJ, a Java variant of an aspect-oriented programming (AOP) language. This paper will be interesting to programming language designers, Java and aspect-oriented programmers, and communities dealing with approaches for inserting and supporting various policy, security, and control languages.

One of the challenges facing architects of scalable information systems involves devising mechanisms for controlling access and routing information correctly. There are numerous traditional approaches available that require nonseamless interfaces with the programming language model (imperative access control). This paper proposes a novel approach that reduces these application-specific tangled seams by applying a modular access control service. Through novel use of CaesarJ, the authors show how access control can be developed without requiring invasive changes to application code, while also supporting a reusable authorization engine. The approach described shows how their use of the language supports a fine-grained service interception model for critical operations, which then invoke the desired policy enforcement technology.

Since AOP is still an emerging paradigm, any information on new languages such as CaesarJ is a welcome contribution to the computing field. The authors have provided a simple example that effectively shows how their approach improves alternatives. Their approach also highlights how family polymorphism provides the desired integration points to accomplish the nonintrusive insertion of application-specific semantic processing.

Reviewer:  Scott Moody Review #: CR132863 (0704-0370)
Bookmark and Share
  Featured Reviewer  
 
Modules And Interfaces (D.2.2 ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Modules And Interfaces": Date
Putting a new face on APL2
Jensen J., Beaty K. IBM Systems Journal 30(4): 469-489, 1991. Type: Article
Dec 1 1993
An Ada/Fortran interfacing exercise
Ranier S. Journal of Pascal, Ada & Modula-2 6(1): 43-49, 1987. Type: Article
Jun 1 1988
C interfaces and implementations
Hanson D. (ed), Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1996. Type: Book (9780201498417)
Sep 1 1997
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy