We analyze how to use the reflective approach to integrate an authorization system into a distributed object-oriented framework. The expected benefits from the reflective approach are: more stability of the security layer (i.e., with a more limited number of hidden bugs), better software and development modularity, more reusability, and the possibility to adapt the security module with at most a few changes to other applications. Our analysis is supported by simple and illustrative examples written in Java.
Reflective Authorization Systems: Possibilities, Benefits and Drawbacks / M. Ancona, W. Cazzola, E.B. Fernandez (LECTURE NOTES IN COMPUTER SCIENCE). - In: Secure Internet Programming : Security Issues for Mobile and Distributed Objects / [a cura di] J. Vitek , C. D. Jensen. - Berlin : Springer, 1999. - ISBN 3540661301. - pp. 35-49 (( convegno EWDOS tenutosi a Brussels nel 1998 [10.1007/3-540-48749-2_3].
Reflective Authorization Systems: Possibilities, Benefits and Drawbacks
W. CazzolaSecondo
;
1999
Abstract
We analyze how to use the reflective approach to integrate an authorization system into a distributed object-oriented framework. The expected benefits from the reflective approach are: more stability of the security layer (i.e., with a more limited number of hidden bugs), better software and development modularity, more reusability, and the possibility to adapt the security module with at most a few changes to other applications. Our analysis is supported by simple and illustrative examples written in Java.File | Dimensione | Formato | |
---|---|---|---|
Ancona1999_Chapter_ReflectiveAuthorizationSystems.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
788.23 kB
Formato
Adobe PDF
|
788.23 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.