Policy-Carrying, Policy-Enforcing Digital Objects
ECDL '00 Proceedings of the 4th European Conference on Research and Advanced Technology for Digital Libraries
ECDL '02 Proceedings of the 6th European Conference on Research and Advanced Technology for Digital Libraries
Hi-index | 0.00 |
Two implementations are given for Java''s stack-inspection access-control policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different formulation of the policy. Performance of the implementations is evaluated, and one is found to be competitive with Java''s less-flexible, JVM-resident implementation. The exercise illustrates the power of the IRM approach for enforcing security policies.