Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applicatio 2016
DOI: 10.1145/2983990.2984021
|View full text |Cite
|
Sign up to set email alerts
|

Extensible access control with authorization contracts

Abstract: Existing programming language access control frameworks do not meet the needs of all software components. We propose an expressive framework for implementing access control monitors for components. The basis of the framework is a novel concept: the authority environment. An authority environment associates rights with an execution context. The building blocks of access control monitors in our framework are authorization contracts: software contracts that manage authority environments. We demonstrate the expres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…After Findler & Felleisen (2002) brought software contracts into functional programming, a cottage industry of software contract verification techniques sprung up (Hinze et al, 2006;Findler et al, 2008;Degen et al, 2009;Dimoulas et al, 2009;Chitil, 2012;Dimoulas et al, 2013;Moore et al, 2016). Swords et al (2015) provides a framework for expressing their interactions, and we extend and revise that work.…”
Section: Additional Software Contract Verification Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…After Findler & Felleisen (2002) brought software contracts into functional programming, a cottage industry of software contract verification techniques sprung up (Hinze et al, 2006;Findler et al, 2008;Degen et al, 2009;Dimoulas et al, 2009;Chitil, 2012;Dimoulas et al, 2013;Moore et al, 2016). Swords et al (2015) provides a framework for expressing their interactions, and we extend and revise that work.…”
Section: Additional Software Contract Verification Techniquesmentioning
confidence: 99%
“…Security Enforcement Contracts. Moore et al (2016) introduce contracts to model authorization and access control (Moore et al, 2016), which provide a domainspecific language for writing security-centric contracts. It is conceivable to recreate such behavior as a strategy with customized contract inputs, wherein the strategy inspects the structure of its contract and acts accordingly.…”
Section: Additional Software Contract Verification Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…But a process can run on behalf of a different user if it runs an executable that has the setuid bit set. When a process invokes a setuid executable, the operating system launches a new process This technical report expands [30] with additional examples and code listings, along with a formal definition and proof of complete monitoring for the contract system described in Section 3. 1. to run the executable and associates the new process with the user that owns the executable, rather than the user that invoked it.…”
Section: Introductionmentioning
confidence: 99%