{"title":"面向对象环境(如Smalltalk-80)中的数据安全性","authors":"R. S. Tosten","doi":"10.1109/ICCL.1988.13069","DOIUrl":null,"url":null,"abstract":"Information-flow theory is used to develop a protocol which supports data security in Smalltalk-80. First, the general approach is explained along with its specific issues and problems. This approach establishes a protocol for data flow among objects in the environment. The basic strategy of this protocol is to develop security levels in which objects reside. In these security levels, information can be passed up to an object in an upper or more secure level, but cannot be passed down to an object in a lower of less secure level. This strategy dictates that a security-checking system be developed to control creating objects and passing messages. Solutions to various problems and modifications in the Smalltalk-80 environment are given. These solutions consist of detailed protocols, refined algorithms, and actual Smalltalk code. The main security-verifying algorithm for Smalltalk methods is demonstrated, along with a rigid evaluation of the algorithm and the general security system.<<ETX>>","PeriodicalId":219766,"journal":{"name":"Proceedings. 1988 International Conference on Computer Languages","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Data security in an object-oriented environment such as Smalltalk-80\",\"authors\":\"R. S. Tosten\",\"doi\":\"10.1109/ICCL.1988.13069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information-flow theory is used to develop a protocol which supports data security in Smalltalk-80. First, the general approach is explained along with its specific issues and problems. This approach establishes a protocol for data flow among objects in the environment. The basic strategy of this protocol is to develop security levels in which objects reside. In these security levels, information can be passed up to an object in an upper or more secure level, but cannot be passed down to an object in a lower of less secure level. This strategy dictates that a security-checking system be developed to control creating objects and passing messages. Solutions to various problems and modifications in the Smalltalk-80 environment are given. These solutions consist of detailed protocols, refined algorithms, and actual Smalltalk code. The main security-verifying algorithm for Smalltalk methods is demonstrated, along with a rigid evaluation of the algorithm and the general security system.<<ETX>>\",\"PeriodicalId\":219766,\"journal\":{\"name\":\"Proceedings. 1988 International Conference on Computer Languages\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-10-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 1988 International Conference on Computer Languages\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCL.1988.13069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1988 International Conference on Computer Languages","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCL.1988.13069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security in an object-oriented environment such as Smalltalk-80
Information-flow theory is used to develop a protocol which supports data security in Smalltalk-80. First, the general approach is explained along with its specific issues and problems. This approach establishes a protocol for data flow among objects in the environment. The basic strategy of this protocol is to develop security levels in which objects reside. In these security levels, information can be passed up to an object in an upper or more secure level, but cannot be passed down to an object in a lower of less secure level. This strategy dictates that a security-checking system be developed to control creating objects and passing messages. Solutions to various problems and modifications in the Smalltalk-80 environment are given. These solutions consist of detailed protocols, refined algorithms, and actual Smalltalk code. The main security-verifying algorithm for Smalltalk methods is demonstrated, along with a rigid evaluation of the algorithm and the general security system.<>