When to trust mobile objects: access control in the Jini/sup TM/ Software System

C. Crichton, J. Davies, J. Woodcock
{"title":"When to trust mobile objects: access control in the Jini/sup TM/ Software System","authors":"C. Crichton, J. Davies, J. Woodcock","doi":"10.1109/TOOLS.1999.787541","DOIUrl":null,"url":null,"abstract":"Future developments in computing, and in consumer electronics, will involve a considerable degree of convergence: applications will work together to locate and provide services. If this convergence is to be implemented successfully, then a shared model for reliable service provision is required. The recently released Jini/sup TM/ Software System (1.0) is an attempt to meet this requirement through object orientation. Based entirely upon existing Java/sup TM/ 2 technology, Jini is a set of protocols and programming models for peer-to-peer service provision using downloaded code and remote method invocation. The paper examines the way in which the Jini Software System will be used. It shows that the existing mechanisms for access control and secure operation provided by Java may prove inadequate in a Jini environment: a Jini enabled device will be vulnerable to attack from its peers. Similar problems may be encountered in other related technologies, such as Enterprise Java Beans. An account of the Jini technology is followed by an exploration of the inadequacies and vulnerabilities; concrete examples are provided to illustrate the possible attacks. The paper ends by showing how the existing specification may be enhanced to produce a secure system without significantly reducing either functionality or flexibility.","PeriodicalId":147966,"journal":{"name":"Proceedings of Technology of Object-Oriented Languages and Systems - TOOLS 30 (Cat. No.PR00278)","volume":"454 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of Technology of Object-Oriented Languages and Systems - TOOLS 30 (Cat. No.PR00278)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TOOLS.1999.787541","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Future developments in computing, and in consumer electronics, will involve a considerable degree of convergence: applications will work together to locate and provide services. If this convergence is to be implemented successfully, then a shared model for reliable service provision is required. The recently released Jini/sup TM/ Software System (1.0) is an attempt to meet this requirement through object orientation. Based entirely upon existing Java/sup TM/ 2 technology, Jini is a set of protocols and programming models for peer-to-peer service provision using downloaded code and remote method invocation. The paper examines the way in which the Jini Software System will be used. It shows that the existing mechanisms for access control and secure operation provided by Java may prove inadequate in a Jini environment: a Jini enabled device will be vulnerable to attack from its peers. Similar problems may be encountered in other related technologies, such as Enterprise Java Beans. An account of the Jini technology is followed by an exploration of the inadequacies and vulnerabilities; concrete examples are provided to illustrate the possible attacks. The paper ends by showing how the existing specification may be enhanced to produce a secure system without significantly reducing either functionality or flexibility.
何时信任移动对象:Jini/sup TM/ Software System中的访问控制
计算和消费电子产品的未来发展将涉及相当程度的融合:应用程序将协同工作以定位和提供服务。如果要成功实现这种融合,则需要一个用于可靠服务提供的共享模型。最近发布的Jini/sup TM/ Software System(1.0)试图通过面向对象来满足这一需求。Jini完全基于现有的Java/sup TM/ 2技术,是一组协议和编程模型,用于使用下载的代码和远程方法调用提供点对点服务。本文考察了Jini软件系统将被使用的方式。它表明,Java提供的访问控制和安全操作的现有机制在Jini环境中可能是不够的:启用Jini的设备将容易受到来自其对等设备的攻击。在其他相关技术(如Enterprise Java Beans)中也可能遇到类似的问题。对Jini技术的描述之后是对其不足之处和漏洞的探索;给出了具体的例子来说明可能的攻击。本文最后展示了如何增强现有规范以产生一个安全的系统,而不会显著降低功能或灵活性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信