AspectJ for Multilevel Security

A multilevel security (MLS) system has two primary goals: fir st, it is intended to prevent unauthorised personnel from acces sing information at higher classification than their authorisatio n. Second, it is intended to prevent personnel from declassifying info rmation. Using an object-oriented approach to implementing MLS resu lts not only with the problem of code scattering and code tanglin g, but also results in weaker enforcement of security. This weaker enforcement of security could be due to the inherent design of t he system or due to a programming error. This paper presents a ca e study examining the benefits of using an aspect-oriented pro gramming language (namely AspectJ) for MLS. We observe that aspe ctoriented programming offers some benefits in enforcing MLS.

[1]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[2]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[3]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[4]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[5]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[6]  Daniel G. Bobrow,et al.  Book review: The Art of the MetaObject Protocol By Gregor Kiczales, Jim des Rivieres, Daniel G. and Bobrow(MIT Press, 1991) , 1991, SGAR.

[7]  Urs Hölzle,et al.  Integrating Independently-Developed Components in Object-Oriented Languages , 1993, ECOOP.

[8]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[9]  Hemma Prafullchandra,et al.  Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.

[10]  Stanley M. Sutton,et al.  N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[11]  Timothy Fraser,et al.  Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[12]  Andrew C. Myers,et al.  JFlow: practical mostly-static information flow control , 1999, POPL '99.

[13]  Daniel P. Friedman,et al.  Aspect-Oriented Programming is Quantification and Obliviousness , 2000 .

[14]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[15]  William G. Griswold,et al.  An Overview of AspectJ , 2001, ECOOP.

[16]  Mehmet Aksit,et al.  Composing Multiple Concerns Using Composition Filters , 2001 .

[17]  Wouter Joosen,et al.  Dynamic and selective combination of extensions in component-based applications , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[18]  Robert Hirschfeld,et al.  Aspect-Oriented Programming with AspectS , 2002 .

[19]  G. Kiczales,et al.  Design pattern implementation in Java and aspectJ , 2002, OOPSLA '02.

[20]  Gregor Kiczales,et al.  Design pattern implementation in Java and aspectJ , 2002, OOPSLA '02.

[21]  Ian Welch,et al.  Re-engineering Security as a Crosscutting Concern , 2003, Comput. J..

[22]  Wouter Joosen,et al.  AOSD & Security: a practical assessment , 2003 .

[23]  Ramnivas Laddad,et al.  Aspectj in Action: Practical Aspect-Oriented Programming , 2003 .

[24]  Joseph D. Gradecki,et al.  Mastering AspectJ: Aspect-Oriented Programming in Java , 2003 .

[25]  Wayne Salamon,et al.  Implementing SELinux as a Linux Security Module , 2003 .

[26]  Chris Vance,et al.  The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 , 2003, USENIX Annual Technical Conference, FREENIX Track.

[27]  Mehmet Aksit,et al.  Principles and Design Rationale of Composition Filters , 2004 .

[28]  Wouter Joosen,et al.  Developing secure applications through aspect-oriented programming , 2004 .