Validating Access Control Configurations in J2EE Applications

  • Authors:
  • Lianshan Sun;Gang Huang;Hong Mei

  • Affiliations:
  • Key Laboratory of High Confidence Software Technologies, Ministry of Education, China School of Electronics Engineering and Computer Science, Peking University, China 100871;Key Laboratory of High Confidence Software Technologies, Ministry of Education, China School of Electronics Engineering and Computer Science, Peking University, China 100871;Key Laboratory of High Confidence Software Technologies, Ministry of Education, China School of Electronics Engineering and Computer Science, Peking University, China 100871

  • Venue:
  • CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access control is a means to achieve information security. When we build large-scale systems based on commercial component middleware platforms, such as those compliant to J2EE, a usual way to enforce access control is to define Access Control Configurations (ACCs) for components in a declarative manner. These ACCs can be enforced by the J2EE security service to grant or deny access requests to components. However, it is difficult for the developers to define correct ACCs according to complex and sometimes ambiguous real-world access control requirements. Faults of ACCs in large-scale J2EE applications may inevitably occur due to various reasons, for example ad hoc mistakes of the developers. This paper identifies three kinds of faults specific to ACCs of J2EE applications as incompleteness, inconsistency, and redundancy, presents validation algorithms for identifying these faults according to access control requirements, illustrates these faults and the validation algorithms with an online bank application.