2001
DOI: 10.1007/3-540-45337-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Reflections on MOP s, Components, and Java Security

Abstract: Abstract. This article investigates the security issues raised by the use of meta-programming systems with Java. For each possible type of MOP (compile-time, load-time, etc.), we study the permissions required for both the base and the meta-level protection domains, taking into account the flow of control between the different parts of the application. We show that the choice of a particular MOP architecture has a strong impact on security issues. Assuming a component-based architecture with code from various … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2001
2001
2013
2013

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…5 For instance, to be able to intercept field accesses we have presented a scheme for transforming such accesses to invocations of automatically generated getter/setter methods -a general transformation scheme whose applicability is not limited to the generation of dynamic proxies and the Java language.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…5 For instance, to be able to intercept field accesses we have presented a scheme for transforming such accesses to invocations of automatically generated getter/setter methods -a general transformation scheme whose applicability is not limited to the generation of dynamic proxies and the Java language.…”
Section: Discussionmentioning
confidence: 99%
“…This makes a case against the claim that the achievement of field access interception with a proxy approach is impossible without specifically modified virtual machine[5] 6. Not to be confused with the Kava approach to behavioral reflection in Java[33], cf.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, by setting the mintypes attribute, the metalevel architect can enforce the use of a particular metaobject framework. This can be useful to impose a security framework [7], or to provide a common metaobject composition framework [44,45,56].…”
Section: Configurationmentioning
confidence: 99%
“…When it is not possible to modify the base-level class, the programmer can subclass the 1 as opposed to the invocation of static methods. 2 Marker interfaces are interfaces that do not declare any methods but ' ag' a class with a speci c property. The use of marker interfaces has become an idiom of the Java language, as exempli ed by t h e Serializable or Cloneable interfaces.…”
Section: Mapping Base-level Objects To Meta-objectsmentioning
confidence: 99%