Abstract
We propose a novel approach for granting to remote clients partial access on arbitrary objects at the granularity of methods. The applications that we target use Remote Method Invocation (RMI). We automatically build proxy objects, and give them to untrusted clients instead of the originals. Proxy objects expose a subset of methods to prevent potentially dangerous calls from clients. We present the system’s semantics, implementation, and its evaluation. Creating a proxy takes an order of magnitude less time than the corresponding RMI lookup.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wallach, D., Appel, A., Felten, E.: SAFKASI: A Security Mechanism for Language-based Systems. ACM Transactions on Software Engineering and Methodology (TOSEM) 9, 341–378 (2000)
Fournet, C., Gordon, A.: Stack Inspection: Theory and Variants. ACM Transactions on Programming Languages and Systems (TOPLAS) 25, 360–399 (2003)
Richmond, M., Noble, J.: Reflections on Remote Reflection. In: Proceedings of the 24th Australasian Conference on Computer Science, vol. 11, pp. 163–170 (2001)
Hugh, M., Ryan, M.: Logic in Computer Science, 2nd edn. Cambridge University Press, Cambridge (2004)
McManus, E.: Build your own interface—dynamic code generation (2006), http://weblogs.java.net/blog/emcmanus/archive/2006/10/build_your_own.html (accessed, 2009-05-22)
Pandey, R., Hashii, B.: Providing Fine-Grained Access Control for Java Programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 449–473. Springer, Heidelberg (1999)
Bryce, C., Razafimahefa, C.: An Approach to Safe Object Sharing. In: Proceedings of the 15th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pp. 367–381 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zarnett, J., Lam, P., Tripunitara, M. (2009). Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. In: Prakash, A., Sen Gupta, I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10772-6_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-10772-6_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10771-9
Online ISBN: 978-3-642-10772-6
eBook Packages: Computer ScienceComputer Science (R0)