2001
DOI: 10.1007/3-540-45309-1_3
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Approach to Static Access Control

Abstract: Abstract. The Java JDK 1.2 Security Architecture includes a dynamic mechanism for enforcing access control checks, so-called stack inspection. This paper studies type systems which can statically guarantee the success of these checks. We develop these systems using a new, systematic methodology: we show that the security-passing style translation, proposed by Wallach and Felten as a dynamic implementation technique, also gives rise to static security-aware type systems, by composition with conventional type sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
78
0

Year Published

2003
2003
2012
2012

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 54 publications
(79 citation statements)
references
References 10 publications
(15 reference statements)
1
78
0
Order By: Relevance
“…The λ sec -calculus of Pottier et al (2005) is a call-by-value λ-calculus model of higherorder stack inspection. We present the language as given by Clements and Felleisen (2004).…”
Section: The λ Sec -Calculus and Stack-inspectionmentioning
confidence: 99%
“…The λ sec -calculus of Pottier et al (2005) is a call-by-value λ-calculus model of higherorder stack inspection. We present the language as given by Clements and Felleisen (2004).…”
Section: The λ Sec -Calculus and Stack-inspectionmentioning
confidence: 99%
“…Java stack inspection [46,34,29] is a language-based security mechanism that uses an underlying security model of principals and resources-all code is annotated with a principal identifier p, and a local ACL policy A mapping principals p to resources r(c) for which they are authorized is taken as given. An event ev p is issued whenever a codebase annotated with p is entered.…”
Section: Stack Inspection With Parameterized Privilegesmentioning
confidence: 99%
“…Their goal is to optimize the authorization performance, while one of the purposes of this paper is to discover authorization requirements by analyzing all possible paths through the program, even those that may not be discovered by a limited number of test cases. Pottier, et al [29] extend and formalize the SPS via type theory using a λ-calculus, called λ sec . However, their work does not address incomplete-program analysis [30].…”
Section: Related Workmentioning
confidence: 99%