A design for fine-grained access control in Melampus
暂无分享,去创建一个
The authors believe that access controls for object-oriented systems should be fine-grained and thus apply to individual methods of individual objects. Efficiently supporting this approach is a challenging tasks, because (at least conceptually) a check is done on every method invocation. Their design uses access control lists and exploits virtual memory facilities to make these checks run fast. The costs include an extra level of indirection for method invocation and per-user storage for preprocessed access control information.<<ETX>>
[1] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[2] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Barbara Liskov,et al. Guardians and Actions: Linguistic Support for Robust, Distributed Programs , 1983, TOPL.
[5] Won Kim,et al. A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.