Zás – An Aspect-Oriented Access Control Framework

نویسنده

  • Paulo Zenida
چکیده

Traditionally, access control system architectures are based on the abstract reference monitor model proposed by Anderson, which tries to separate the access control logic from the logic of applications. The implementation of this model has been difficult since access control presents itself as a crosscutting concern, i.e., it crosscuts the functionalities of applications. However, the developments of the techniques that support the separation of concerns, particularly aspect oriented programming, have been enabling the development of systems in which the access control code is not scattered through the code of the application. Nevertheless, these solutions are still too specific to a given application. This work presents an access control framework for Java applications, named Zás, which can be reused and that applies the abstract reference monitor proposed by Anderson. This framework supports access control policies using different kinds of context information and allows them to be changed at runtime. Zás was developed in the aspect oriented programming language AspectJ and it uses Java 5 annotations. We used Zás in several small applications since its inception, so as to gain experience and insight from its application. Nevertheless, to evaluate the performance and applicability of the final version of the Zás framework prototype, we integrated it in a very large Web application called Fénix, which brought us very interesting results, such as showing the easiness of applicating Zás to already existing applications, and also the main caveats and limitations of Zás.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications

Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with restricted access, yet the rule to grant a request is highly dependent on the application state. Hence it is common to see the code for implementing access control scattered over the system and tangled with the functional code...

متن کامل

Helping to Meet the Security Needs of Enterprises: Using FDAF to Build RBAC into Software Architectures

The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns. For example, a financial organization, such as a bank, needs to ensure that employee and customer data are kept private and account balances for customers are not corrupted. Some of these needs may be realized in a collection of software applications such as employee p...

متن کامل

Aspect-Oriented Modeling of Access Control in Web Applications

Access control is only inadequately supported by the common design methods for Web applications. We propose an aspect-oriented technique for solving this problem. Our approach is an extension of UML-based Web Engineering. UML state machines are used to specify the access control rules of navigation nodes. Aspectoriented modeling helps modularize the design.

متن کامل

An aspect-based approach to modeling access control concerns

Specifying, enforcing and evolving access control policies is essential to prevent security breaches and unavailability of resources. These access control design concerns impose requirements that allow only authorized users to access protected computer-based resources. Addressing these concerns in a design results in the spreading of access control functionality across several design modules. T...

متن کامل

Development of a framework to evaluate service-oriented architecture governance using COBIT approach

Nowadays organizations require an effective governance framework for their service-oriented architecture (SOA) in order to enable them to use a framework to evaluate their current state governance and determine the governance requirements, and then to offer a suitable model for their governance. Various frameworks have been developed to evaluate the SOA governance. In this paper, a brief introd...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007