This paper presents a proposed extension to the object oriented paradigm, whereby software objects are not only responsible for the encapsulation of data, but are also aware of the sensitivity of that data. Those software objects which encapsulate sensitive information will actively defend both their sensitive data and their functionality. These self-defending objects use object level role based access control to secure those sensitive resources. Applying access control measures within self-defending objects will not only ensure that access controls are appropriate and non bypassable, but will also simplify the development of security aware applications
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...
This paper makes two primary contributions toward establishing support for application-specific fact...
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm,...
In current database systems the responsibility for enforcing security is often given to the various ...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
This thesis presents a study of realizing commercial security, as defined in the Clark and Wilson Mo...
We believe that the engineering of mobile or persistent processes is hindered in many systems by the...
We believe that the engineering of mobile or persistent processes is hindered in many systems by the...
Self-adaptive access control, in which self- * properties are applied to protecting systems, is a pr...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
This presentation makes two primary contributions toward establishing support for application-specif...
Providing security for a general-purpose database system is an expensive operation. An access contro...
Self-protecting software systems are a class of autonomic systems capable of detecting and mitigatin...
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...
This paper makes two primary contributions toward establishing support for application-specific fact...
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm,...
In current database systems the responsibility for enforcing security is often given to the various ...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
Today’s software landscape features a high degree of complexity, frequent change and many uncertaint...
This thesis presents a study of realizing commercial security, as defined in the Clark and Wilson Mo...
We believe that the engineering of mobile or persistent processes is hindered in many systems by the...
We believe that the engineering of mobile or persistent processes is hindered in many systems by the...
Self-adaptive access control, in which self- * properties are applied to protecting systems, is a pr...
Today's software landscape features a high degree of complexity, frequent changes in requirements an...
This presentation makes two primary contributions toward establishing support for application-specif...
Providing security for a general-purpose database system is an expensive operation. An access contro...
Self-protecting software systems are a class of autonomic systems capable of detecting and mitigatin...
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...
This paper makes two primary contributions toward establishing support for application-specific fact...
International audienceFor the last 20 years, the number of vulnerabilities has increased near 20 tim...