Supporting Reconfigurable Security Policies for Mobile Programs
- B. Hashii, S. Malabarba, R. Pandey, and M. Bishop,
“Supporting Reconfigurable Security Policies for Mobile Programs,”
Computer Networks 33(1-6) pp. 77–93 (June 2000).
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms of system design and extensibility, mobile programs are a security risk and require strong access control. Further, the mobile code environment is fluid, i.e. the programs and resources located on a host may change rapidly, necessitating an extensible security model. In this paper, we present the design and implementation of a security infrastructure. The model is built around an event=response mechanism, in which a response is executed when a security-related event occurs. We support a fine-grained, conditional access control language, and enforce policies by instrumenting the bytecode of protected classes. This method enhances efficiency and promotes separation of concerns between security policy and program specification. This infrastructure also allows security policies to change at runtime, adapting to varying system state, intrusion, and other events.
©2000 by Elsevier Science B.V.
The definitive version was published in the
Computer Networks 33