Data security in an object-oriented environment such as Smalltalk-80

R. S. Tosten
{"title":"Data security in an object-oriented environment such as Smalltalk-80","authors":"R. S. Tosten","doi":"10.1109/ICCL.1988.13069","DOIUrl":null,"url":null,"abstract":"Information-flow theory is used to develop a protocol which supports data security in Smalltalk-80. First, the general approach is explained along with its specific issues and problems. This approach establishes a protocol for data flow among objects in the environment. The basic strategy of this protocol is to develop security levels in which objects reside. In these security levels, information can be passed up to an object in an upper or more secure level, but cannot be passed down to an object in a lower of less secure level. This strategy dictates that a security-checking system be developed to control creating objects and passing messages. Solutions to various problems and modifications in the Smalltalk-80 environment are given. These solutions consist of detailed protocols, refined algorithms, and actual Smalltalk code. The main security-verifying algorithm for Smalltalk methods is demonstrated, along with a rigid evaluation of the algorithm and the general security system.<<ETX>>","PeriodicalId":219766,"journal":{"name":"Proceedings. 1988 International Conference on Computer Languages","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1988 International Conference on Computer Languages","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCL.1988.13069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Information-flow theory is used to develop a protocol which supports data security in Smalltalk-80. First, the general approach is explained along with its specific issues and problems. This approach establishes a protocol for data flow among objects in the environment. The basic strategy of this protocol is to develop security levels in which objects reside. In these security levels, information can be passed up to an object in an upper or more secure level, but cannot be passed down to an object in a lower of less secure level. This strategy dictates that a security-checking system be developed to control creating objects and passing messages. Solutions to various problems and modifications in the Smalltalk-80 environment are given. These solutions consist of detailed protocols, refined algorithms, and actual Smalltalk code. The main security-verifying algorithm for Smalltalk methods is demonstrated, along with a rigid evaluation of the algorithm and the general security system.<>
面向对象环境(如Smalltalk-80)中的数据安全性
在Smalltalk-80中,利用信息流理论开发了一个支持数据安全的协议。首先,阐述了一般方法及其具体问题和问题。这种方法为环境中对象之间的数据流建立了一种协议。该协议的基本策略是开发对象驻留的安全级别。在这些安全级别中,信息可以向上传递给较高或较安全级别的对象,但不能向下传递给较低或较不安全级别的对象。这种策略要求开发一个安全检查系统来控制对象的创建和消息的传递。给出了Smalltalk-80环境中各种问题的解决方案和修改。这些解决方案由详细的协议、精细的算法和实际的Smalltalk代码组成。演示了Smalltalk方法的主要安全验证算法,并对该算法和一般安全系统进行了严格的评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信