2002
DOI: 10.1007/3-540-36124-3_47
|View full text |Cite
|
Sign up to set email alerts
|

Object Security Attributes: Enabling Application-Specific Access Control in Middleware

Abstract: Abstract. This paper makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification framework for reasoning about the architecture of the security mechanisms in distributed applications that follow the decision-enforcement paradigm of the reference monitor. It uses the framework to demonstrate that the existing solutions lack satisfying tradeoffs for a wide range of those applications that require applic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2003
2003
2011
2011

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…As it was argued in [2], the use of target attributes reduces the need for mixing authorization and other security logic with business logic. These application-specific attributes and the mechanism for obtaining them at run time are directly based on the prior work on Attribute Function [2,18].…”
Section: Permission Constructionmentioning
confidence: 99%
See 3 more Smart Citations
“…As it was argued in [2], the use of target attributes reduces the need for mixing authorization and other security logic with business logic. These application-specific attributes and the mechanism for obtaining them at run time are directly based on the prior work on Attribute Function [2,18].…”
Section: Permission Constructionmentioning
confidence: 99%
“…These application-specific attributes and the mechanism for obtaining them at run time are directly based on the prior work on Attribute Function [2,18]. The extensible retrieval mechanism is designed as a replaceable TargetAttributeRetriever interface, with a simple implementation provided by the architecture implementation.…”
Section: Permission Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…The use of target attributes reduces the need for mixing authorization and other security logic with business logic. These applicationspecific attributes and the mechanism for obtaining them are directly based on our prior work on Attribute Function (AF) [33,34], overview of which is provided in Appendix B. 4.…”
Section: Adaptable Information For Authorization Decisionsmentioning
confidence: 99%