Combining Security with Meta Programming in Java
نویسندگان
چکیده
This article investigates the security issues raised by the use of meta-programming systems with Java. For each possible type of MOP (compile-time, load-time, etc.), we study what are the permissions required for both the base and the meta-level protection domains, taking into account the ow of control between the di erent parts of the application. We show that the choice of a particular MOP architecture has a strong impact on the security issues. Another important outcome of this article is the following: in a component-based architecture with code from various origins and trusts, we provide a set of rules for combining the permissions associated with each protection domain (integration, base-level, meta-level, etc.).
منابع مشابه
Security and Meta Programming in Java
This article investigates the security problems that may appear with the use of meta-programming extensions to the Java language and also how meta-programming may help in expressing and implementing security policies. Depending on the moment when the shift from the base-level to the meta-level is performed, we present diierent security problems and their consequences. We also raise a number of ...
متن کاملReflections on MOPs, Components, and Java Security
This article investigates the security issues raised by the use of meta-programming systems with Java. For each possible type of MOP (compile-time, load-time, etc.), we study the permissions required for both the base and the meta-level protection domains, taking into account the flow of control between the different parts of the application. We show that the choice of a particular MOP architec...
متن کاملWeighing and Prioritizing Branding Components of Tourism Objectives by Combining Meta synthesis Approach and Logistic Fuzzy Programming Preferences
The destination of tourism is a major element in tourism marketing. Branding tourism destination is a process by which a tourism destination develops its focal features, develops and delivers its main audience, can build a reputation, establish its reputation, strengthen slowly or even change, which is important for tourism purposes. Brand recognition is very important for communicating success...
متن کاملThe Design and Implementation of Guaran aAlexandre
Several reeective architectures have attempted to improve meta-object reuse by supporting composition of meta-objects, but have done so using limited mechanisms such as Chains of Responsibility. We advocate the adoption of the Composite pattern to deene meta-conngurations. In the meta-object protocol (MOP) of Guaran a, a composer meta-object can control reconnguration of its component meta-obje...
متن کاملComposition of Meta-objects in Guaran a Composition of Meta-objects in Guaran A
There are meta-object protocols (MOPs) that do not provide support for meta-object composition. Others require explicit modii-cation of existing meta-level code or provide a limited delegation mechanism in order to support it. There is much room for improvement in this eld. The MOP of Guaran a favors the development of meta-objects that can be easily composed. Composers are meta-objects that de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001