Using virtual machine security to reinforce components constraints

Aurélio A.M. Matsui, Straus Michalsky, Marco Aurélio Gerosa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A key problem in component-based frameworks is controlling what each component can access. This problem is particularly complex in cases in which a system is specified by non-programmers who describe systems as a set of component instances and connections between these instances. An effective way to implement such control is by translating component constraints into security constraints that a virtual machine can administer. Our contribution is to use injection of security logic not only to control end-user access to functions, but also to control component to component interactions. We have found that injection of constraint verification points can be elegantly done using AOP.

Original languageEnglish (US)
Title of host publicationProceedings - 38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012
Pages138-141
Number of pages4
DOIs
StatePublished - 2012
Externally publishedYes
Event38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012 - Cesme, Izmir, Turkey
Duration: Sep 5 2012Sep 8 2012

Publication series

NameProceedings - 38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012

Conference

Conference38th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2012
Country/TerritoryTurkey
CityCesme, Izmir
Period9/5/129/8/12

Keywords

  • Internet security
  • based systems
  • component model
  • dynamic reconfiguration

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Using virtual machine security to reinforce components constraints'. Together they form a unique fingerprint.

Cite this