메뉴 건너뛰기




Volumn 19, Issue 1, 2001, Pages 36-70

Separating access control policy, enforcement, and functionality in extensible systems

Author keywords

Access check; Auditing; D.4 Software : Operating Systems; D.4.6 Operating Systems : Security and Protection Access controls; Extensible systems; Java; Protection domain; Protection domain transfer; Security; Security policy; SPIN

Indexed keywords


EID: 0041865338     PISSN: 07342071     EISSN: None     Source Type: Journal    
DOI: 10.1145/367742.367773     Document Type: Article
Times cited : (17)

References (73)
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • (Mar.). MITRE Corp., Bedford, MA. Also ADA023588, National Technical Information Service
    • BELL, D. E. AND LAPADULA, L. J. 1976. Secure computer systems: Unified exposition and Multics interpretation. Tech Rep. MTR-2997 Rev. 1 (Mar.). MITRE Corp., Bedford, MA. Also ADA023588, National Technical Information Service.
    • (1976) Tech Rep. MTR-2997 Rev. 1
    • Bell, D.E.1    LaPadula, L.J.2
  • 6
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • (Apr.). MITRE Corp., Bedford, MA. Also ADA039324, National Information Service
    • BIBA, K. J. 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153 Rev. 1 (Apr.). MITRE Corp., Bedford, MA. Also ADA039324, National Information Service.
    • (1977) Tech. Rep. MTR-3153 Rev. 1
    • Biba, K.J.1
  • 7
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Springer-Verlag, New York, NY
    • BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, NY, 185-210.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 10
    • 84976797486 scopus 로고
    • Sharing and protection in a single-address-space operating system
    • Nov.
    • CHASE, J. S., LEVY, H. M., FEELEY, M. J., AND LAZOWSKA, E. D. 1994. Sharing and protection in a single-address-space operating system. ACM Trans. Comput. Syst. 12, 4 (Nov.), 271-307.
    • (1994) ACM Trans. Comput. Syst. , vol.12 , Issue.4 , pp. 271-307
    • Chase, J.S.1    Levy, H.M.2    Feeley, M.J.3    Lazowska, E.D.4
  • 11
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
    • CLARK, D. AND WILSON, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.
    • (1987) Proceedings of the IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.1    Wilson, D.2
  • 15
  • 16
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2 (May), 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.2 , pp. 236-243
    • Denning, D.E.1
  • 19
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • (Caledon Hills, Ontario, Canada, Sept.). ACM Press, New York, NY
    • ERLINGSSON, Ú. AND SCHNEIDER, F. B. 1999. SASI enforcement of security policies: A retrospective. In Proceedings of the 1999 ACM Workshop on New Security Paradigms (Caledon Hills, Ontario, Canada, Sept.). ACM Press, New York, NY, 87-95.
    • (1999) Proceedings of the 1999 ACM Workshop on New Security Paradigms , pp. 87-95
    • Erlingsson, Ú.1    Schneider, F.B.2
  • 23
  • 25
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • May/June
    • GONG, L. 1997. Java security: Present and near future. IEEE Micro 17, 3 (May/June), 14-19.
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 28
    • 84887507059 scopus 로고    scopus 로고
    • Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
    • (Monterey, CA, Dec.). USENIX Assoc., Berkeley, CA
    • GONG, L., MUELLER, M., AND PRAFULLCHANDRA, H. 1997. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (Monterey, CA, Dec.). USENIX Assoc., Berkeley, CA, 103-112.
    • (1997) Proceedings of the USENIX Symposium on Internet Technologies and Systems , pp. 103-112
    • Gong, L.1    Mueller, M.2    Prafullchandra, H.3
  • 31
    • 0030721196 scopus 로고    scopus 로고
    • A protection scheme for mobile agents on Java
    • (MOBICOM '97, Budapest, Hungary, Sept. 26-30), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Chairs. ACM Press, New York, NY
    • HAGIMONT, D. AND ISMAIL, L. 1997. A protection scheme for mobile agents on Java. In Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '97, Budapest, Hungary, Sept. 26-30), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Chairs. ACM Press, New York, NY, 215-222.
    • (1997) Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking , pp. 215-222
    • Hagimont, D.I.L.1
  • 32
    • 0024089972 scopus 로고
    • The confused deputy
    • Oct.
    • HARDY, N. 1988. The confused deputy. ACM SIGOPS Oper. Syst. Rev. 22, 4 (Oct.), 36-38. http://www.cis.upenn.edu/ KeyKOS/ConfusedDeputy.html
    • (1988) ACM SIGOPS Oper. Syst. Rev. , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 34
    • 84875947153 scopus 로고    scopus 로고
    • Detours: Binary interception of win32 functions
    • (Seattle, WA, July). USENIX Assoc., Berkeley, CA
    • HUNT, G. AND BRUBACHER, D. 1999. Detours: Binary interception of Win32 functions. In Proceedings of the 3rd USENIX Windows NT Symposium (Seattle, WA, July). USENIX Assoc., Berkeley, CA, 135-143.
    • (1999) Proceedings of the 3rd USENIX Windows NT Symposium , pp. 135-143
    • Hunt, G.1    Brubacher, D.2
  • 35
    • 0027808377 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • (Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY
    • JONES, M. B. 1993. Interposition agents: Transparently interposing user code at the system interface. In Proceedings of the 14th ACM Symposium on Operating Systems Principles (Asheville, NC, Dec. 5-8), A. P. Black and B. Liskov, Chairs. ACM Press, New York, NY, 80-83.
    • (1993) Proceedings of the 14th ACM Symposium on Operating Systems Principles , pp. 80-83
    • Jones, M.B.1
  • 39
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce "commercial" security
    • Oakland, CA, Apr.
    • LEE, T. 1988. Using mandatory integrity to enforce "commercial" security. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, Apr.). 140-146.
    • (1988) Proceedings of the IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.1
  • 45
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a mach-based system
    • (Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA
    • MINEAR, S. E. 1995. Providing policy control over object operations in a Mach-based system. In Proceedings of the 5th USENIX UNIX Security Symposium (Salt Lake City, UT, June). USENIX Assoc., Berkeley, CA, 141-156.
    • (1995) Proceedings of the 5th USENIX UNIX Security Symposium , pp. 141-156
    • Minear, S.E.1
  • 47
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • (SOSP '97, Saint-Malo, France, Oct. 5-8), W. M. Waite, Ed. ACM Press, New York, NY
    • MYERS, A. C. AND LISKOV, B. 1997. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP '97, Saint-Malo, France, Oct. 5-8), W. M. Waite, Ed. ACM Press, New York, NY, 129-142.
    • (1997) Proceedings of the 16th ACM Symposium on Operating Systems Principles , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 49
    • 0003975281 scopus 로고
    • Prentice-Hall series in innovative technology. Prentice-Hall, Inc., Upper Saddle River, NJ
    • NELSON, G., ED. 1991. Systems Programming With Modula-3. Prentice-Hall series in innovative technology. Prentice-Hall, Inc., Upper Saddle River, NJ.
    • (1991) Systems Programming with Modula-3
    • Nelson, G.1
  • 51
  • 52
    • 85085853286 scopus 로고    scopus 로고
    • Dynamic binding for an extensible system
    • (OSDI '96, Seattle, WA, Oct. 28-31), K. Petersen and W. Zwaenepoel, Chairs. ACM Press, New York, NY
    • PARDYAK, P. AND BERSHAD, B. N. 1996. Dynamic binding for an extensible system. In Proceedings of the 2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI '96, Seattle, WA, Oct. 28-31), K. Petersen and W. Zwaenepoel, Chairs. ACM Press, New York, NY, 201-212.
    • (1996) Proceedings of the 2nd USENIX Symposium on Operating Systems Design and Implementation , pp. 201-212
    • Pardyak, P.1    Bershad, B.N.2
  • 54
    • 0012692275 scopus 로고    scopus 로고
    • Microsoft .NET framework delivers the platform for an integrated, service-oriented web
    • Oct.
    • RICHTER, J. 2000. Microsoft .NET framework delivers the platform for an integrated, service-oriented web. MSDN Mag. 15, 10 (Oct.), 56-65.
    • (2000) MSDN Mag. , vol.15 , Issue.10 , pp. 56-65
    • Richter, J.1
  • 56
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept.
    • SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.), 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 58
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Feb.
    • SCHNEIDER, F. B. 2000. Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3, 1 (Feb.), 30-50.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 59
    • 0042484465 scopus 로고    scopus 로고
    • Tech. Rep. DTOS CDRL A008. Secure Computing Corporation, Roseville, MN
    • SECURE COMPUTING CORPORATION. 1997a. DTOS lessons learned report. Tech. Rep. DTOS CDRL A008. Secure Computing Corporation, Roseville, MN.
    • (1997) DTOS Lessons Learned Report
  • 60
    • 0041859446 scopus 로고    scopus 로고
    • Tech. Rep. DTOS CDRL A011. Secure Computing Corporation, Roseville, MN
    • SECURE COMPUTING CORPORATION. 1997b. DTOS general system security and assurability assessment report. Tech. Rep. DTOS CDRL A011. Secure Computing Corporation, Roseville, MN.
    • (1997) DTOS General System Security and Assurability Assessment Report
  • 62
    • 0041350423 scopus 로고    scopus 로고
    • Design and implementation of a distributed virtual machine for networked computers
    • (Kiawah Island Resort, SC, Dec.). ACM Press, New York, NY
    • SIRER, E. G., GRIMM, R., GREGORY, A. J., AND BERSHAD, B. N. 1999. Design and implementation of a distributed virtual machine for networked computers. In Proceedings of the 17th ACM Symposium on Operating System Principles (Kiawah Island Resort, SC, Dec.). ACM Press, New York, NY, 202-216.
    • (1999) Proceedings of the 17th ACM Symposium on Operating System Principles , pp. 202-216
    • Sirer, E.G.1    Grimm, R.2    Gregory, A.J.3    Bershad, B.N.4
  • 65
    • 0028132513 scopus 로고
    • ATOM: A system for building customized program analysis tools
    • (PLDI '94, Orlando, FL, June 20-24), V. Sarkar, B. Ryder, and M. L. Soffa, Chairs. ACM Press, New York, NY
    • SRIVASTAVA, A. AND EUSTACE, A. 1994. ATOM: A system for building customized program analysis tools. In Proceedings of the ACM SIGPLAN '94 Conference on Programming Language, Design and Implementation (PLDI '94, Orlando, FL, June 20-24), V. Sarkar, B. Ryder, and M. L. Soffa, Chairs. ACM Press, New York, NY, 196-205.
    • (1994) Proceedings of the ACM SIGPLAN '94 Conference on Programming Language, Design and Implementation , pp. 196-205
    • Srivastava, A.1    Eustace, A.2
  • 66
    • 0039088052 scopus 로고    scopus 로고
    • Fine-grained dynamic instrumentation of commodity operating system kernels
    • (OSDI '99, New Orleans, LA., Feb.). USENIX Assoc., Berkeley, CA
    • TAMCHES, A. AND MILLER, B. P. 1999. Fine-grained dynamic instrumentation of commodity operating system kernels. In Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation (OSDI '99, New Orleans, LA., Feb.). USENIX Assoc., Berkeley, CA, 117-130.
    • (1999) Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation , pp. 117-130
    • Tamches, A.1    Miller, B.P.2
  • 67
    • 84982069422 scopus 로고    scopus 로고
    • J-kernel: A capability-based operating system for Java
    • Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Springer-Verlag, New York, NY
    • VON EICKEN, T., CHANG, C.-C., CZAJKOWSKI, G., HAWBLITZEL, C., HU, D., AND SPOONHOWER, D. 1999. J-Kernel: A capability-based operating system for Java. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, Eds. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, NY, 369-393.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 369-393
    • Von Eicken, T.1    Chang, C.-C.2    Czajkowski, G.3    Hawblitzel, C.4    Hu, D.5    Spoonhower, D.6
  • 69
    • 0003396725 scopus 로고    scopus 로고
    • Ph.D. Dissertation. Department of Computer Science, Princeton Univ., Princeton, NJ
    • WALLACH, D. S. 1999. A new approach to mobile code security. Ph.D. Dissertation. Department of Computer Science, Princeton Univ., Princeton, NJ.
    • (1999) A New Approach to Mobile Code Security
    • Wallach, D.S.1
  • 70
    • 0031677290 scopus 로고    scopus 로고
    • Understanding Java stack introspection
    • (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • WALLACH, D. S. AND FELTEN, E. W. 1998. Understanding Java stack introspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 52-63.
    • (1998) Proceedings of the 1998 IEEE Symposium on Security and Privacy , pp. 52-63
    • Wallach, D.S.1    Felten, E.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.