{"title":"Using Virtual Machine Security to Reinforce Components Constraints","authors":"A. A. M. Matsui, Straus Michalsky, M. Gerosa","doi":"10.1109/SEAA.2012.72","DOIUrl":null,"url":null,"abstract":"A key problem in component-based frameworks is controlling what each component can access. This problem is particularly complex in cases in which a system is specified by non-programmers who describe systems as a set of component instances and connections between these instances. An effective way to implement such control is by translating component constraints into security constraints that a virtual machine can administer. Our contribution is to use injection of security logic not only to control end-user access to functions, but also to control component to component interactions. We have found that injection of constraint verification points can be elegantly done using AOP.","PeriodicalId":298734,"journal":{"name":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 38th Euromicro Conference on Software Engineering and Advanced Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEAA.2012.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
A key problem in component-based frameworks is controlling what each component can access. This problem is particularly complex in cases in which a system is specified by non-programmers who describe systems as a set of component instances and connections between these instances. An effective way to implement such control is by translating component constraints into security constraints that a virtual machine can administer. Our contribution is to use injection of security logic not only to control end-user access to functions, but also to control component to component interactions. We have found that injection of constraint verification points can be elegantly done using AOP.