Abstract
Parallel object-based languages, in general, have no way of expressing constraints on the way that objects interact at runtime. Such constraints are necessary for security, in particular. In this paper, an access control model designed for a parallel object-based language is presented and it is integrated into a small language. An example is given to show how the access control model’s features are used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hogg J. Islands: Aliasing Protection in Object-Oriented Languages. In: ACM Object-Oriented Programming Systems, Languages and Applications Conference. Canada, 1991, pp 271–285.
Korsen T, McGregor JD. Understanding Object-Oriented: a unifying paradigm. CACM 1990; 33: 39–60.
Strom R, Bacon D, Goldberg A et al. HERMES: a Language for Distributed Computing. Prentice Hall, New Jersey, 1991.
Saltzer JH. Protection and Control of Information Sharing in Multics. CACM 1974; 17: 388–402.
Jones AK, Liskov BH. A Language Extension for Expressing Constraints on Data Access. CACM 1978; 21: 358–367.
McGraw JR, Andrews GR. Access Control in Parallel Programs. IEEE TOSE 1979; 5: 1–9.
Dennis TD, Van Horn EC. Programming Semantics for Multiprogrammed Computations. CACM 1966; 9: 337–345.
Levy H. Capability-Based Computer Systems. Digital Press, Mass. 1984.
Harrison MA, Ruzzo WL, Ullman JD. Protection in Operating Systems. CACM 1976; 19: 461–471.
Mizuno M, Oldhöeft AE. An Access Control Language for Object-Oriented Programming Systems. Research Report. Kansas State University, 1989.
Black A, Hutchinson N, Jul E et al. The Eden project: a final report. Research Report TR 86–11–01. Washington University, 1986.
Cohen E, Jefferson D. Protection in the Hydra Operating System. In: 5th ACM Symposium on Operating Principles. Texas, 1975, pp 141–160.
Saltzer J, Schroeder M. The Protection of Information in Computer Systems. IEEE Proc 1975; 63: 1278–1308.
Bryce C. An Access Control Model for an Object-Based Programming Language. IRISA Research Report, Rennes, France, 1994.
America P, de Bakker J, Kok J et al. Operational Semantics of a Parallel Object-Oriented Language. In: 13th ACM Symposium on the Principles of Programming Languages. Florida, 1986, pp 194–208.
Chase JS, Levy H, Lazowska ED et al. Lightweight Shared Objects in a 64-bit Operating System. In: ACM Object-Oriented Programming, Systems, Languages and Applications Conference. Canada, 1993, pp 397–413.
Synder A. Encapsulation and Inheritance in Object-Oriented Programming Languages. In: ACM Object-Oriented Programming Systems, Languages and Applications Conference. 1986, pp 38–45.
Sandhu RS. Expressive Power of the Schematic Protection Model. IOS Journal of Comp. Security 1992; 1: 59–98.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bryce, C. (1994). An Access Control Model for a Parallel Object-Based Programming Language. In: Thuraisingham, B., Sandhu, R., Ting, T.C. (eds) Security for Object-Oriented Systems. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3858-7_12
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3858-7_12
Publisher Name: Springer, London
Print ISBN: 978-3-540-19877-2
Online ISBN: 978-1-4471-3858-7
eBook Packages: Springer Book Archive