Information Security Applications
DOI: 10.1007/978-3-540-71093-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Visualization of Permission Checks in Java Using Static Analysis

Abstract: Abstract. The security manager in Java 2 is a runtime access control mechanism. Whenever an access permission to critical resources is requested, the security manager inspects a call stack to examine whether the program has appropriate access permissions or not. This run-time permission check called stack inspection enforces access-control policies that associate access rights with the class that initiates the access. In this paper, we develop a visualization tool which helps programmers enforce security polic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Chang et al [4] provided a backward static analysis to approximate redundant permission checks with must-fail stack inspection and success permission checks with must-pass stack inspection. This approach was later employed in a visualization tool of permission checks in Java [8]. But the tool didn't provide any means to relieve users from the burden of deciding access rights.…”
Section: Related Workmentioning
confidence: 99%
“…Chang et al [4] provided a backward static analysis to approximate redundant permission checks with must-fail stack inspection and success permission checks with must-pass stack inspection. This approach was later employed in a visualization tool of permission checks in Java [8]. But the tool didn't provide any means to relieve users from the burden of deciding access rights.…”
Section: Related Workmentioning
confidence: 99%