Encapsulators: a new software paradigm in Smalltalk-80
OOPLSA '86 Conference proceedings on Object-oriented programming systems, languages and applications
Static type checking of multi-methods
OOPSLA '91 Conference proceedings on Object-oriented programming systems, languages, and applications
Towards a methodology for explicit composition of metaobjects
Proceedings of the tenth annual conference on Object-oriented programming systems, languages, and applications
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
Reflection and metalevel architectures in object-oriented programming (workshop session)
OOPSLA/ECOOP '90 Proceedings of the European conference on Object-oriented programming addendum : systems, languages, and applications: systems, languages, and applications
Monitors: an operating system structuring concept
Communications of the ACM
The Java Language Specification
The Java Language Specification
The Art of the Metaobject Protocol
The Art of the Metaobject Protocol
Mobile Agents and Security
Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2)
HASE '99 The 4th IEEE International Symposium on High-Assurance Systems Engineering
Reflections on MOPs, Components, and Java Security
ECOOP '01 Proceedings of the 15th European Conference on Object-Oriented Programming
ECOOP '98 Workshop ion on Object-Oriented Technology
Testing MetaObject Protocols Generated by Open Compilers for Safety-Critical Systems
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
A Simple Security-Aware MOP for Java
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
Reflex - Towards an Open Reflective Extension of Java
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
ACM SIGOPS Operating Systems Review
Reflection and semantics in LISP
POPL '84 Proceedings of the 11th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Processes in KaffeOS: isolation, resource management, and sharing in java
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
The design and implementation of Guaraná
COOTS'99 Proceedings of the 5th conference on USENIX Conference on Object-Oriented Technologies & Systems - Volume 5
An access control framework for reflective middleware
Journal of Computer Science and Technology
Secure and modular access control with aspects
Proceedings of the 12th annual international conference on Aspect-oriented software development
Hi-index | 0.01 |
The advent of component-based reflective applications raises the issue of protecting baselevel components from the actions performed by metalevel components. However, by their very nature, reflective applications are far more difficult to secure than non-reflective applications, which certainly explains why the problem has received very little attention so far. In this paper we present a security framework for enforcing access control between metalevel components and the baselevel components they reflect on Rather than designing a new security architecture from scratch, we extend the standard security architecture of Java to provide security for a fully-functional proxy-based MOP for Java. We implement a number of well-known meta-level behaviors and study their security requirements, the results of which support our design choices.