Skip to main content

An Access Control Model for a Parallel Object-Based Programming Language

  • Chapter
Security for Object-Oriented Systems

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

  • 38 Accesses

Abstract

Parallel object-based languages, in general, have no way of expressing constraints on the way that objects interact at runtime. Such constraints are necessary for security, in particular. In this paper, an access control model designed for a parallel object-based language is presented and it is integrated into a small language. An example is given to show how the access control model’s features are used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hogg J. Islands: Aliasing Protection in Object-Oriented Languages. In: ACM Object-Oriented Programming Systems, Languages and Applications Conference. Canada, 1991, pp 271–285.

    Google Scholar 

  2. Korsen T, McGregor JD. Understanding Object-Oriented: a unifying paradigm. CACM 1990; 33: 39–60.

    Google Scholar 

  3. Strom R, Bacon D, Goldberg A et al. HERMES: a Language for Distributed Computing. Prentice Hall, New Jersey, 1991.

    Google Scholar 

  4. Saltzer JH. Protection and Control of Information Sharing in Multics. CACM 1974; 17: 388–402.

    Article  Google Scholar 

  5. Jones AK, Liskov BH. A Language Extension for Expressing Constraints on Data Access. CACM 1978; 21: 358–367.

    Article  MATH  Google Scholar 

  6. McGraw JR, Andrews GR. Access Control in Parallel Programs. IEEE TOSE 1979; 5: 1–9.

    MATH  Google Scholar 

  7. Dennis TD, Van Horn EC. Programming Semantics for Multiprogrammed Computations. CACM 1966; 9: 337–345.

    Article  Google Scholar 

  8. Levy H. Capability-Based Computer Systems. Digital Press, Mass. 1984.

    Google Scholar 

  9. Harrison MA, Ruzzo WL, Ullman JD. Protection in Operating Systems. CACM 1976; 19: 461–471.

    Article  MathSciNet  MATH  Google Scholar 

  10. Mizuno M, Oldhöeft AE. An Access Control Language for Object-Oriented Programming Systems. Research Report. Kansas State University, 1989.

    Google Scholar 

  11. Black A, Hutchinson N, Jul E et al. The Eden project: a final report. Research Report TR 86–11–01. Washington University, 1986.

    Google Scholar 

  12. Cohen E, Jefferson D. Protection in the Hydra Operating System. In: 5th ACM Symposium on Operating Principles. Texas, 1975, pp 141–160.

    Google Scholar 

  13. Saltzer J, Schroeder M. The Protection of Information in Computer Systems. IEEE Proc 1975; 63: 1278–1308.

    Article  Google Scholar 

  14. Bryce C. An Access Control Model for an Object-Based Programming Language. IRISA Research Report, Rennes, France, 1994.

    Google Scholar 

  15. America P, de Bakker J, Kok J et al. Operational Semantics of a Parallel Object-Oriented Language. In: 13th ACM Symposium on the Principles of Programming Languages. Florida, 1986, pp 194–208.

    Google Scholar 

  16. Chase JS, Levy H, Lazowska ED et al. Lightweight Shared Objects in a 64-bit Operating System. In: ACM Object-Oriented Programming, Systems, Languages and Applications Conference. Canada, 1993, pp 397–413.

    Google Scholar 

  17. Synder A. Encapsulation and Inheritance in Object-Oriented Programming Languages. In: ACM Object-Oriented Programming Systems, Languages and Applications Conference. 1986, pp 38–45.

    Google Scholar 

  18. Sandhu RS. Expressive Power of the Schematic Protection Model. IOS Journal of Comp. Security 1992; 1: 59–98.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bryce, C. (1994). An Access Control Model for a Parallel Object-Based Programming Language. In: Thuraisingham, B., Sandhu, R., Ting, T.C. (eds) Security for Object-Oriented Systems. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3858-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3858-7_12

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19877-2

  • Online ISBN: 978-1-4471-3858-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics