Abstract
Conventional access control mechanisms are rather insensitive to occurrences of context-dependent illegal accesses. Insensitivity to context-dependent accesses may lead to failure to protect network users and resources. Context-dependent illegal accesses resulting from data and privilege flows in open networks cannot be prevented by either authentication or access control mechanisms since unauthorized access need not be attempted. In this paper we present a protection model which tracks data and privilege flows in mobile code systems. It can uniformly define various types of illegal access patterns and has the advantage of preventing context-dependent illegal accesses such as those caused by inadvertent execution of remote mobile code containing viruses or Trojan Horses. The proposed flow control model is expected to complement the conventional model for access control.
Original language | English |
---|---|
Pages (from-to) | 191-200 |
Number of pages | 10 |
Journal | Journal of Parallel and Distributed Computing |
Volume | 64 |
Issue number | 2 |
DOIs | |
State | Published - Feb 2004 |
Keywords
- Access control
- Flow control
- Internet security
- Java
- Mobile code
- Remote execution
- World Wide Web