IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 1 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Security is simple either via net or java
cause proper programming will take security into consideration. Bad programming will make no assumptions about security.

psuedo code on
*************************
while true
need a system call
! check if I have permission
if not error and gag the executable
if true execute with username/passwd or whatever works on this box and OS
end
fi
*************************
end psuedo coded
thanx,
bill
write a security class or a get module wether doing tops or woops :)
thanx,
bill

tshirt front "born to die before I get old"
thshirt back "fscked another one didnja?"
New That is a procedural model of security
A model that works much better for OO programming is to put all of your security checks in your object constructors. After that, if you have the object then you have permission to make the request and should be allowed to, with no muss, no fuss.

The mental model here is that possession of the object is possession of the keys.

This model is known as a capability model. You can find some good [link|http://www.eros-os.org/essays/00Essays.html|introductory essays] from the EROS project, and for more reading the design of the GNU Hurd project is somewhat similar in concept.

Cheers,
Ben
New Actually J2EE uses a declarative model
Basically when you deploy your EJB you include a deployment descriptor which states who can access it (ACL based). You can put restrictions on the EJB or on individual methods. The developer writes no security code, the underlying J2EE app server intercepts all calls to the EJB and verifies that they are allowed.
New Hmmm...got any other links?
I've done some looking into this topic for my own apps, but it seems prohibitively difficult to try implementing this without OS support for it built in. Any app-level links?
---------------------------------
A stupid despot may constrain his slaves with iron chains; but a true politician binds them even more strongly by the chain of their own ideas;...despair and time eat away the bonds of iron and steel, but they are powerless against the habitual union of ideas, they can only tighten it still more; and on the soft fibres of the brain is founded the unshakable base of the soundest of Empires."

Jacques Servan, 1767
New Sorry...
I have seen application-specific links, but they tend to be to dead projects, etc.

By and large it seems that if you want to use this strategy in building an application, it seems to work fairly nicely. (I have done it on a small scale, and was happy.) But you wind up having to build a certain amount of infrastructure, and there don't seem to be a lot of available components structured in this way.

So it is a design idea that I think is useful, even without OS/language support. But I don't have any good links on that.

Cheers,
Ben
     J2EE vs. Microsoft.NET - (cforde) - (28)
         Security is simple either via net or java - (boxley) - (4)
             That is a procedural model of security - (ben_tilly) - (3)
                 Actually J2EE uses a declarative model - (bluke)
                 Hmmm...got any other links? - (tseliot) - (1)
                     Sorry... - (ben_tilly)
         .NET replays the ActiveX fiasco - (neelk) - (22)
             Side note. - (inthane-chan) - (7)
                 Muah. - (admin) - (2)
                     Moi, for one. -NT - (CRConrad)
                     Is most amusing. -NT - (static)
                 I don't get it... - (neelk) - (3)
                     I don't get it either. - (inthane-chan)
                     Kitchen sink... - (ChrisR)
                     I bet it's issues with the Virtual Machine. - (static)
             Re: .NET replays the ActiveX fiasco - (Squidley) - (13)
                 Interesting list - (ChrisR) - (7)
                     Oh, so it was YOU! - (CRConrad) - (2)
                         rephrasing? - (ChrisR) - (1)
                             I take it you *do* know what I'm referring to - (CRConrad)
                     Re: Interesting list - (Squidley) - (3)
                         Viruses and verified security holes - (ben_tilly) - (2)
                             Re: Viruses and verified security holes - (Squidley) - (1)
                                 ActiveX is actually one thing... - (Arkadiy)
                 Re: .NET replays the ActiveX fiasco - (neelk) - (3)
                     EzBug hangover? - (pwhysall) - (1)
                         Finger habits are hard to break. :) -NT - (neelk)
                     typo fix - (neelk)
                 Re: .NET replays the ActiveX fiasco - (pwhysall)

with the hot blonde.
188 ms