2004
DOI: 10.1145/1022494.1022530
|View full text |Cite
|
Sign up to set email alerts
|

Static analysis of role-based access control in J2EE applications

Abstract: This work describes a new technique for analysis of Java 2, Enterprise Edition (J2EE) applications. In such applications, Enterprise Java Beans (EJBs) are commonly used to encapsulate the core computations performed on Web servers. Access to EJBs is protected by application servers, according to role-based access control policies that may be created either at development or deployment time. These policies may prohibit some types of users from accessing specific EJB methods.We present a static technique for ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2005
2005
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 22 publications
0
11
0
1
Order By: Relevance
“…Related work on J2EE access control configurations analysis [13,14] stems from premises analogous to ours. However these approaches rather focus on checking the consistency of programmatic access control configurations w.r.t.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Related work on J2EE access control configurations analysis [13,14] stems from premises analogous to ours. However these approaches rather focus on checking the consistency of programmatic access control configurations w.r.t.…”
Section: Related Workmentioning
confidence: 99%
“…However these approaches rather focus on checking the consistency of programmatic access control configurations w.r.t. the implementation of J2EE components of the business tier [13] or both business and web tiers [14], in order, e.g., to detect accesses to EJB fields or methods inconsistent with the access control policy. Our work focusing on declarative security is complementary: our formalization supports other reasoning tasks, such as the comparison of different configurations.…”
Section: Related Workmentioning
confidence: 99%
“…Another research topic of interest during the last years is Java EE 31 as a software architecture for the transaction-based execution of applications programmed in Java. In 2004, Naumovich and Centonze (2004) focused on EJBs inside the J2EE middleware framework. Another approach for combining roles and Java EE is provided in Sun et al (2008) where the authors presented a role-based proposal for automatic generation of J2EE access control configurations.…”
Section: Roles In Middleware Architecturesmentioning
confidence: 99%
“…In comparison, the other kinds of attacks we consider in this paper have received far less attention; notable exceptions include [24,50] on access control and authentication, [37] on session integrity, and [9,47] on CSRF. Some recent work studies new kinds of attacks that we do not consider in this paper; they include clickjacking [6] and XCS (cross-channel scripting) [15] in particular.…”
Section: Related Workmentioning
confidence: 99%