WO1999030218A1 - Typed, parameterized, and extensible access control permissions - Google Patents

Typed, parameterized, and extensible access control permissions Download PDF

Info

Publication number
WO1999030218A1
WO1999030218A1 PCT/US1998/026077 US9826077W WO9930218A1 WO 1999030218 A1 WO1999030218 A1 WO 1999030218A1 US 9826077 W US9826077 W US 9826077W WO 9930218 A1 WO9930218 A1 WO 9930218A1
Authority
WO
WIPO (PCT)
Prior art keywords
permission
class
represented
action
subclass
Prior art date
Application number
PCT/US1998/026077
Other languages
French (fr)
Inventor
Li Gong
Original Assignee
Sun Microsystems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Microsystems, Inc. filed Critical Sun Microsystems, Inc.
Priority to AU17183/99A priority Critical patent/AU1718399A/en
Publication of WO1999030218A1 publication Critical patent/WO1999030218A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Definitions

  • the present invention relates to security mechanisms in a computer system. BACKGROUND OF THE INVENTION
  • One way to compromise the security of a computer system is to cause the computer system to execute software that performs harmful actions on the computer system.
  • security measures that may be used to prevent a computer system from executing harmful software.
  • One example is to check all software executed by the computer system with a " virus" checker.
  • virus checkers only search for very specific software instructions.
  • Many methods of using software to tamper with a computer's resources would not be detected by a virus checker.
  • Another very common measure used to prevent the execution of software that tampers with a computer's resources is the "trusted developers approach" . According to the trusted developers approach, system administrators limit the software that a computer system can access to only software developed by trusted software developers.
  • Such trusted developers may include, for example, well know vendors or in-house developers. Fundamental to the trusted developers approach is the idea that computer programs are created by developers, and that some developers can be trusted to not have produced software that compromises security. Also fundamental to the trusted developers approach is the notion that a computer system will only execute programs that are stored at locations that are under control of the system administrators. Recently developed methods of running applications involve the automatic and immediate execution of software code loaded from remote sources over a network. When the remote sources include computer systems that are outside the control of system administrators, the trusted developers approach does not work.
  • One attempt to adapt the trusted developers approach to systems that can execute code from remote sources is referred to as the sand box method. The sand box method allows all code to be executed, but places restrictions on remote code.
  • the sand box method permits all trusted code full access to a computer system's resources and all remote code limited access to a computer system's resources.
  • Trusted code is usually stored locally on the computer system under the direct control of the owners or admimstrators of the computer system, who are accountable for the security of the trusted code.
  • the sandbox approach is not very granular.
  • the sandbox approach is not very granular because all remote code is restricted to the same limited set of resources.
  • Providing security measures that allow more granularity than the sand box method involves establishing a complex set of relationships between principals and permissions.
  • a "principal” is an entity in the computer system to which permissions are granted. Examples of principals include processes, objects and threads.
  • a "permission” is an authorization by the computer system that allows a principal to perform a particular action or function.
  • a method and system for providing security using typed and extensible control permissions is provided.
  • the establishment and maintenance of complex security rules are enforced in a way that takes advantage of the power and simplicity of the inheritance feature of object oriented programming.
  • a " permission super class” is established from which subclasses may be created. Objects that belong to subclasses of the permission super class represent permissions, and are therefore referred to as permission objects.
  • the permission subclasses inherit the methods and attributes of the permission super class. According to one embodiment, one of the methods defined by the permission super class and inherited by the permission subclasses is a validation method. Each permission subclass inherits the validation method from the permission super class and provides an implementation of the validation method.
  • the validation method indicates whether a given permission is encompassed by the permission represented by the particular permission object.
  • the validation method of a permission object PO1 may be invoked to determine whether the permission represented by another permission object PO2 is encompassed in the permission represented by PO1, where both PO1 and PO2 belong to classes that descend from said permission super class.
  • a permission to perform a first action, represented by PO1 authorizes a request to perform a second action, which requires a second permission represented by PO2, by invoking the validation method of PO1 to determine whether the first permission represents an authorization to perform the requested second action.
  • permissions represent actions on targets.
  • a first permission object can specify a first action and a first target
  • a second permission object can specify a second action and a second target.
  • a determination is made of the whether the permission represented by the first permission object encompasses the permission represented by the second permission object based on whether the first action implies the second action and the first target implies the second target.
  • determine for example, whether a permission to perform a first action on a first target, represented by the first permission object, authorizes a request to perform a second action on second target, which requires a second permission represented by the second object, by determining whether first action implies the second action, and the first target implies the second target.
  • Figure 1 is a block diagram of a computer system on which the present invention may be implemented
  • Figure 2 is a block diagram showing attributes and methods associated with a permission super class and a subclass of the permission super class and permission objects belonging to the subclass of the permission super class in accordance with one embodiment of the present invention
  • Figure 3 is a flow chart showing the steps for establishing a permission super class and a subclass of the permission super class in accordance with one embodiment of the present invention
  • Figure 4 is a block diagram outlining a security mechanism using permission objects in accordance with one embodiment of the present invention.
  • Figure 5 is a block diagram showing an exemplary policy file
  • Figure 6 is a block diagram showing a call stack associated with a thread and the protection domains containing permission objects associated with the objects represented by the call stack in accordance with one embodiment of the present invention
  • Figure 7 is a flow chart showing steps followed by a security mechanism to determine whether a particular action is authorized in accordance with one embodiment of the present invention.
  • FIG. 1 is a block diagram that illustrates a computer system 100 upon which an embodiment of the invention may be implemented.
  • Computer system 100 includes a bus 102 or other communication mechanism for communicating information, and a processor 104 coupled with bus 102 for processing information.
  • Computer system 100 also includes a main memory 106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 102 for storing information and instructions to be executed by processor 104.
  • Main memory 106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 104.
  • Computer system 100 further includes a read only memory (ROM) 108 or other static storage device coupled to bus 102 for storing static information and instructions for processor 104.
  • ROM read only memory
  • a storage device 110 such as a magnetic disk or optical disk, is provided and coupled to bus 102 for storing information and instructions.
  • Computer system 100 may be coupled via bus 102 to a display 112, such as a cathode ray tube (CRT), for displaying information to a computer user.
  • An input device 114 is coupled to bus 102 for communicating information and command selections to processor 104.
  • cursor control 116 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 104 and for controlling cursor movement on display 112.
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • the invention is related to the use of computer system 100 for establishing typed permissions.
  • establishing typed permissions is provided by computer system 100 in response to processor 104 executing one or more sequences of one or more instructions contained in main memory 106.
  • Such instructions may be read into main memory 106 from another computer-readable medium, such as storage device 110.
  • Execution of the sequences of instructions contained in main memory 106 causes processor 104 to perform the process steps described herein.
  • hard- wired circuitry may be used in place of or in combination with software instructions to implement the invention.
  • embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • Non-volatile media includes, for example, optical or magnetic disks, such as storage device 110.
  • Volatile media includes dynamic memory, such as main memory 106.
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 102. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 104 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem local to computer system 100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector coupled to bus 102 can receive the data carried in the infra-red signal and place the data on bus 102.
  • Bus 102 carries the data to main memory 106, from which processor 104 retrieves and executes the instructions.
  • the instructions received by main memory 106 may optionally be stored on storage device 110 either before or after execution by processor 104.
  • Computer system 100 also includes a communication interface 118 coupled to bus 102.
  • Communication interface 118 provides a two-way data communication coupling to a network link 120 that is connected to a local network 122.
  • communication interface 118 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 118 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 120 typically provides data communication through one or more networks to other data devices.
  • network link 120 may provide a connection through local network 122 to a host computer 124 or to data equipment operated by an
  • ISP Internet Service Provider
  • ISP 126 provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet” 128.
  • Internet 128 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 120 and through communication interface 118, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information.
  • Computer system 100 can send messages and receive data, including program code, through the network(s), network link 120 and communication interface 118.
  • a server 130 might transmit a requested code for an application program through Internet 128, ISP 126, local network 122 and communication interface 118.
  • ISP 126 ISP 126
  • local network 122 ISP 126
  • communication interface 118 ISP 126
  • one such downloaded application provides for establishing typed permissions as described herein.
  • the received code may be executed by processor 104 as it is received, and/or stored in storage device 110, or other non- volatile storage for later execution.
  • computer system 100 may obtain application code in the form of a carrier wave. FUNCTIONAL OVERVIEW
  • systems that allow execution of software from remote sources present difficult security problems.
  • the systems that have been developed to address those problems are complex, often requiring the use of elaborate permission rules to deal with principals received from numerous sources.
  • the permission rules must be updated by someone who understands the complexities of the system.
  • the complexities associated with elaborate permission rules and systems are reduced by making use of a powerful object-oriented concept understood by most programmers, known as " inheritance" , to establish relationships between classes of permissions.
  • inheritance a powerful object-oriented concept understood by most programmers
  • a " permission super class" is established from which subclasses may be created. Objects that belong to subclasses of the permission super class represent permissions, and are therefore referred to as permission objects.
  • the permission subclasses inherit the methods and attributes of the permission super class, including a validation method. Each permission subclass provides an implementation of the validation method.
  • the validation method When the validation method is invoked for a particular permission object belonging to a permission subclass, the validation method indicates whether a given permission is encompassed by the permission represented by the particular permission object. For example, the validation method of a permission object PO1 may be invoked to determine whether the permission represented by another permission object PO2 is encompassed in the permission represented by PO1, where both PO1 and PO2 belong to classes that descend from said permission super class.
  • permission management tends to be simpler and more intuitive.
  • the typed permission system provided herein allows easy modification to adapt to the changes, without requiring specialized knowledge of complex security-management techniques.
  • a permission is an authorization by the computer system that allows a principal to perform a particular action or function.
  • permissions can be organized into categories that correlate to categories of actions that are performed on computer systems. Each category is characterized by one or more attributes shared by all permissions belonging to the category or subcategory. Attributes of each category include an action associated with the permission, and can include various other attributes that further qualify the action attribute, such as a target attribute.
  • a target is any entity, such as a bank account, an adult TV channel, or a computer resource (e.g. files, memory, printers, database records), to which an action is directed.
  • a file system permission has an action attribute and a target attribute.
  • the target is a particular file or set of files upon which an action can be performed.
  • the action attribute is an action that can be performed on a file, such as " writing" to a file.
  • the target attribute serves to further qualify the action by limiting the entities upon which the action can be performed.
  • An example of a file system permission is an authorization to "write” (i.e. the action) to a particular file like "/anyfile” (i.e. the target). Note that in the examples provided herein, the file(s) and directory in which the file(s) is contained are represented in a form recognized by those skilled in the art.
  • a permission category is a bank account permission for a computer application used to manage bank accounts.
  • a bank account permission can have an action attribute, an account attribute, and an amount attribute.
  • An example of a bank account permission would be an authorization to " withdraw” from bank account " 1233456" an amount of three dollars.
  • permissions categories can further comprise subcategories that are useful for organizing permissions.
  • a subcategory of a bank account permissions can be permissions associated with a particular bank.
  • One permission can imply another.
  • that one permission is said to encompass the other permission.
  • a permission to write to a directory such as "c:/”
  • a permission to write to any file in the directory such as " c:/thisfile”
  • an attribute of a permission can imply an attribute of another permission.
  • the action attribute of a permission to " write” implies an action attribute of a permission to " read” .
  • An amount attribute of a permission to withdraw three hundred dollars implies another attribute of a permission to withdraw two hundred dollars.
  • a permission encompasses another permission when all the permission attributes of one permission imply all the corresponding permission attributes of another permission.
  • a permission to " write” to file “ d:/somefile” implies a permission to " read” from file “ d:/somefile” because a " write” implies a " read” .
  • a permission to " write” to file “ d:/somefile” does not imply a permission to " read” from file “ d:/otherfile” because " d:/somefile” does not imply “ d:/otherfile”
  • classes are used to represent categories of and subcategories of permissions, and objects of those classes are used to represent the particular permissions in a category or subcategory of permissions.
  • a permission represented by a class is herein referred to as a typed permission.
  • Classes used to represent categories of permissions are herein referred to as permission classes.
  • Objects which belong to a permission class are herein referred to as permission objects.
  • the fields of a permission class are used to represent the attributes of the category or subcategory of permissions represented by the permission class.
  • a FilePermission permission class can represent the category of file system permissions.
  • the FilePermission class can have an action field which corresponds to the action attribute, and a target field which corresponds to the target attribute.
  • Each permission object contains fields with values corresponding to attributes of a particular permission represented by the permission object.
  • a given object belonging to the FilePermission class can have an action field with a value representing a " write” action, and a target field with a value representing the directory " d:/” .
  • the given object represents a permission to "write" to directory "d:/” .
  • each permission object is an instance of a permission class.
  • a permission object and the permission it represents are said to represent an instance of a permission category or subcategory.
  • THE PERMISSION SUPER CLASS Because all permissions share some common attributes, it is useful -and efficient to represent all categories of permissions with one class that is a super class of all permission classes.
  • the super class for all permission classes is herein referred to as the permission super class.
  • Each permission class is a subclass of the permission super class.
  • the permission super class contains fields which represent attributes common to all permissions.
  • One such field is an action field, which represents the action attribute common to all permissions.
  • the permission super class establishes a set of common methods that are useful for and inherited by all permission objects, such as a get_action method.
  • the common action method returns a value representing the action field.
  • An implementation for the get_action method may be provided in the permission super class. According to one embodiment, the implementation for the get_action method simply returns the value of the action field.
  • the permission super class In addition to implementing a set of common methods shared by permission subclasses, the permission super class also establishes the interface to methods that should be supported by every object but whose implementation depends on the particular permission class of the object.
  • An example of such method is a validation method that indicates whether a permission represented by one permission object encompasses another permission represented by another permission object.
  • a permission typically encompasses another permission when each attribute of the one permission implies the corresponding attribute of the other permission.
  • attributes of one permission category may differ from attributes of another permission category
  • the permission classes which represent permission categories may contain different sets of fields, thus necessitating a different implementation of the validation method for some of the permission classes.
  • the rules that govern whether a particular attribute implies another attribute may vary from one permission category to another.
  • the implementation required for the validation methods which carry out the rules can vary.
  • the FilePermission permission class has an action field and a target field.
  • the target field could represent a file or a set of files (e.g.. "d:/somedirectory/somefile").
  • a permission class representing a bank account, AccountPermission can have an action field, an account field, and a maximum amount field.
  • the two permission classes, FilePermission and AccountPermission have a different number attributes and different kinds of attributes.
  • the rules governing whether one attribute of one permission implies a corresponding attribute of another permission may differ from permission class to permission class as well. Specifically, the implementation of determining whether a permission for one set of files implies a permission for another set of files differs significantly from an implementation that determines whether a permission for one maximum amount implies another amount. It is worth noting that permissions of different permission classes usually cannot encompass each other.
  • the permission super class may be used to ensure that the result type of a method and its parameters can remain constant across all permission classes. Defining the interface to method in the permission super class without providing the implementation for the method establishes an interface that can be relied upon by all objects and object implementers (i.e. programmers) when interacting with permission objects. Those skilled in the art will recognize various techniques can be used to provide such an interface. One method would be to provide a super class with an abstract method that would be implemented by subclasses of the super class. Another method would be to provide a permission super class that defines a default implementation that subclasses can override.
  • a default implementation can be, for example, to always return a value indicating that one permission is not encompassed by another permission.
  • Another method uses Java Interfaces instead of abstract classes. CREATING TYPED PERMISSIONS Techniques for creating and using typed permissions shall now be described with reference to the permission classes shown in Fig. 2.
  • the classes shown in Fig. 2 are used to create objects that represent permissions to manage access to a television (TV). For purposes of illustration, assume that permissions associated with accessing a TV have an action attribute and a target attribute.
  • the action attribute can either be to " watch” , " enable” , or "disenable” a channel.
  • the target attribute represents a particular channel.
  • Permission Object 282 represents a permission to "disenable” “channel 5"
  • permission objects 286 represents a permission to "watch” “ channel 5"
  • Permission object 282 and permission object 286 are objects belonging to the subclass TV subclass 230.
  • TV subclass 230 is a subclass of permission super class 210.
  • step 310 the attributes of the permission super class are established.
  • an action field 222 is established for permission super class 210.
  • the action field 222 is a string data type.
  • the action field 222 represents the permission attribute of any category of permission.
  • a validation method and other methods for a permission object are established.
  • an abstract validation method 224 is provided.
  • the validation method accepts as its first parameter an object reference of the data type (i.e. class) Permission class.
  • an object reference referring to an object belonging to any permission class is an acceptable parameter.
  • the data type of the value returned by the method is Boolean.
  • the Boolean value returned by the validation method indicates whether the permission represented by the permission object referred to by the object reference is encompassed by the permission represented by the permission object whose validation method is invoked. For example, assume X and Y are permission objects.
  • the method invocation X.Validation( Y ) will return True if the permission represented by Y is encompassed in the permission represented by X, and False if the permission represented by Y is not encompassed in the permission represented by X.
  • no implementation of the abstract validation method 224 is provided in permission super class 210.
  • the implementation is left to the subclasses of permission super class 210.
  • a get_action method is also provided in the permission super class 210.
  • the get_action method returns a string value representing the value contained in the action field 222.
  • An implementation is provided for the get_action method. The implementation merely returns the value of the action field as the return value of the get_action method.
  • an implementation of the abstract validation method 224 is provided in the form of a validation implementation 242 of a subclass of Permission super class 210.
  • a TV subclass 230 is defined as a subclass of Permission super class 210.
  • the implementation 242 of abstract validation method 224 includes code which, when executed, initially determines whether the object reference parameter refers to a permission object of same class as that of the permission object whose validation method is being invoked.
  • the classes of permission objects differ, one permission represented by a permission object does NOT encompass the permission represented by the other permission object because a permission of one category does not encompass a permission of another category. For example, a TV permission does not encompass a file system permission.
  • the code in the implementation 242 ensures that each attribute of the permission represented by the object reference is implied by each attribute of the permission represented by the object whose validation method is invoked. For example, if the action field and the target field of the permission object referred to by the object reference are identical to the action field and target field of the permission object whose validation method is invoked, then the validation method returns a true Boolean value.
  • step 340 attributes and other methods of the TV subclass 230 are established.
  • the other methods may include both new methods, and new implementations that override the implementations of inherited methods.
  • a target field representing the target attribute of a TV permission is defined.
  • a get_target method 246 is also provided. The get_target method simply returns a string value representing the channel attribute of the permission represented by the TV permission object.
  • An example code implementation of the TV subclass 230 is illustrated below.
  • code example may resemble the JAVA programming language by Sun Microsystems Inc., the example is merely for illustrative purposes and is not meant to be representative of an actual code implementation.
  • class TV extends Permission ⁇ protected String target;
  • step 350 the permission super class 210 and subclasses of the permission super class 210 are compiled and placed in a software library.
  • a software library Those skilled in the art are familiar with software tools and techniques used to compile the classes described above and to place them in software libraries.
  • An example of such a tool is the Java Development Kit by Sun Microsystems Inc.
  • techniques described above are not limited to permission classes whose parent class is the permission super class 210.
  • the techniques are applicable to subclasses of other permission classes which themselves are descendants of the permission super class. For example, it may be useful to provide a TV permission class, and then a subclass of the TV permission class that corresponds to a particular cable company.
  • a PermissionCoUection super class is provided to allow security admimstrators to easily manage sets of permissions.
  • a PermissionCoUection class is used to create objects that each contain a set of zero or more permission objects.
  • An object that is a subclass of the PermissionCoUection super class is herein referred to as a PermissionCoUection object.
  • a PermissionCoUection object manages a set of permission objects contained by the PermissionCoUection object.
  • a homogenous PermissionCoUection object may only contain permission objects belonging to the same class, a heterogeneous PermissionCoUection object may contain permission objects belonging to different classes.
  • the PermissionCoUection super class defines several methods. One method returns an enumeration of the permission objects contained in the PermissionCoUection object. Another method, add_permission, adds a permission object to the set of permission objects contained in the PermissionCoUection object.
  • the add_permission method has a parameter of the type Permission. In the case of a homogenous PermissionClass object, for example, the method to add a permission object does not add a permission object if it is not of the same type (i.e. class) as any other permission object already contained in the PermissionCoUection object.
  • the method returns a Boolean flag indicating whether or not a permission object was added.
  • a group validation method is another method defined by the PermissionCoUection super class.
  • the method accepts one parameter of the data type Permission.
  • the method indicates whether or not any of the permissions represented by the permission objects contained in a PermissionCoUection object encompass the permission represented by the permission object specified by the parameter.
  • the method processes each permission object by invoking each permission objects validation method until either (1) the validation methods of all permission objects in the set have returned False or (2) a validation method for a permission object in the set returns True.
  • a PermissionCoUection object used to manage a set of permission objects can be created directly for the PermissionCoUection super class, or from a subclass of the PermissionCoUection class.
  • a subclass of the PermissionCoUection super class can contain methods that provide functionality specific to a particular permission class.
  • a PermissionCoUection object for FilePermissions can provide an IsTargetlmplied method.
  • the IsTargetlmplied method indicates whether or not a particular target is implied by another target.
  • the method could syntactically determine whether " /sys/sysfile” is implied by "/sys/*” .
  • SECURITY USING "FINAL" DESIGNATION Many programming languages provide the keyword " final" to designate that something cannot be overridden. For example, if a class X is defined as final, then the compiler will generate an error if subsequent code attempts to define a subclass of class X. Alternatively, a class that is not final may have one or more methods that are declared to be final.
  • class Y may not be final, but class Y may define five methods, three of which are declared to be final.
  • the compiler will allow subsequent code to define a subclass of class Y, but the subclass will inherit the three methods as is. The subclass will not be able to override the three inherited methods by defining alternative implementations for the methods.
  • support for the " final" keyword is combined with permission classes to implement strong but flexible security mechanisms.
  • a first developer defines a FilePermission subclass of the Permission super class.
  • the Validation method for the FilePermission class returns True when the invoked permission is " write c: ⁇ *" and the input permission is " write c: ⁇ sys ⁇ config.txt” .
  • the first developer may want to distribute the FilePermission class in a runtime library for use by other developers.
  • the security policy programmed into the FilePermission logic may be compromised. For example, security would be compromised if the validate method of the FilePermission class is overridden with logic that returns True when the invoked permission is " write c: ⁇ *" and the input permission is " write d: ⁇ *" .
  • the first developer it may be critical for the applications developed by the users of the runtime library to reflect the same degree of security as is programmed into the FilePermission logic. To prevent security loopholes, the first developer may declare the FilePermission class to be final. As a result, any user of the library would be unable to use any security policies with respect to file access other than the security policies embodied in the original FilePermission class.
  • While declaring the FilePermission class to be final will prevent security breaches, it limits the flexibility of the library. For example, users of the library should be allowed to implement security policies with respect to file access that are more restrictive than the FilePermission class policies. Thus, a user of the library may decide to implement a system that requires exact directory matches. In such a system "write c: ⁇ *" would encompass “write c: ⁇ hello.txt” but would not encompass “write c: ⁇ sys ⁇ joe.txt” . To allow library users to enforce more restrictive security policies, the FilePermission class may be non-final, while all methods of the class but one are declared as final. The non- final method, which may be called the AdditionalCheck method, may be overridden by the library user.
  • the non- final method which may be called the AdditionalCheck method
  • the Validation Method which is * * ⁇ nal, may call the AdditionalCheck method as a final step to determine whether a particular permission is encompassed by the invoked permission object.
  • the Boolean value generated by the Validation Method logic are combined in a logical AND operation with the Boolean value generated by the AdditionalCheck method to produce the Boolean value that is ultimately returned by the Validation Method.
  • the security policy employed by the application developed by a library user is at least as restrictive as those embodied in the original FilePermission class logic.
  • the library user is allowed to override the AdditionalCheck method, the library user has the flexibility to implement security rules that are more restrictive than the original FilePermission class logic.
  • the exemplary security mechanism includes a policy file 444, a policy object 440, a domain mapper object 448, an access controller 480, and one or more protection domains 482.
  • the security mechanism is implemented using a code executor 410.
  • Code executor 410 executes code which code executor 410 receives from code stream 420.
  • One example of a code executor is a Java virtual machine.
  • a Java virtual machine interprets code called byte code.
  • Byte code is code generated by a Java compiler from source files containing text. The Java virtual machine is described in detail in Tim Lindholm & Frank Yellin, The Java Virtual Machine Specification (1996).
  • code from code stream 420 is object oriented software. Consequently, the code is in the form of methods associated with objects that belong to classes.
  • One or more class definitions for a class are contained in code from code stream 420. The fields and methods of the objects belonging to a class are defined by a class definition. These class definitions are used by code executor 410 to create objects which are instances of the classes defined by the class definitions.
  • class definitions are generated from source code written by a programmer.
  • a programmer using a Java Development Kit enters source code that conforms to the Java programming language into a source file.
  • the source code embodies class definitions and other instructions which are used to generate byte code which controls the execution of a code executor (i.e. a Java virtual machine).
  • a code executor i.e. a Java virtual machine.
  • Techniques for defining classes and generating code executed by a code executor, such as a Java virtual machine are well known to those skilled in the art.
  • Each class defined by a class definition from code stream 420 is associated with a class name 438 and a code source 436.
  • Code executor 410 maintains an association between a class and its class name and code source.
  • the code source represents a source of code from which is code received.
  • a "source of code” is an entity from which computer instructions are received. Examples of sources of code include a file or persistent object stored on a data server connected over a network, a FLASH_EPROM reader that reads instructions stored on a FLASHJEPROM, or a set of system libraries.
  • the code source may be a composite record containing a uniform resource locator ("URL" ) 434 and set of public cryptographic keys 432.
  • a URL identifies a particular source.
  • the URL is a string used to uniquely identify any server connected to the world wide web.
  • a URL may also be used to designate sources local to computer system 100.
  • the URL includes the designation of the file and directory of the file that is the source of the code stream that a server is providing.
  • a public cryptographic key herein referred to as a key, is used to validate the digital signature which may be included in a file used to transport related code and data. Public cryptographic keys and digital signatures are described in Schneier, Applied Cryptography. (1996).
  • the keys may be contained in the file, may be contained in a database associating keys with sources (e.g. URLs), or be accessible using other possible alternative techniques.
  • a class may be associated with the digital signature associated with the file used to transport code defining the class, or the class definition of the class may be specifically associated with a digital signature.
  • a class that is associated with a valid digital signature is referred to as being signed.
  • Valid digital signatures are digital signatures that can be verified by known keys stored in a database. If a class is associated with a digital signature which can not be verified, or the class is not associated with any digital signature, the class is referred to as being unsigned. Unsigned classes may be associated with a default key.
  • a key may be associated with a name, which may be used to look up the key in the database.
  • code source format has been described as including data indicating a cryptographic key and URL, alternate formats are possible. Other information indicating the source of the code, or combinations thereof, may be used to represent code sources. Therefore, it is understood that the present invention, is not limited to any particular format for a code source.
  • the source of code stream 420 may be from zero or more untrusted sources 424 or zero or more trusted sources 428.
  • Untrusted sources 424 and trusted sources 428 may be file servers, including file servers that are part of the World Wide Web network of servers connected to the Internet.
  • An untrusted source is typically not under the direct control of the operators of computer system 100.
  • Code from untrusted sources is herein referred to as untrusted code. Because untrusted code is considered to pose a high security risk, the set of computer resources that untrusted code may access is usually restricted to those which do not pose security threats.
  • Code from a trusted source is code usually developed by trusted developers. Trusted code is considered to be reliable and pose much less security risk than remote code.
  • remote code Software code which is loaded over the network from a remote source and immediately executed is herein referred to as remote code.
  • a remote source is a computer system of another separate organization or individual.
  • the remote source is often connected to the Internet.
  • untrusted code is remote code.
  • code from sources local to computer system 100 may pose a high security risk. Code from such local sources may be deemed to be untrusted code from an untrusted source.
  • code from a particular remote source may be considered to be reliable and to pose relatively little risk, and thus may be deemed to be trusted code from a trusted resource.
  • typed permissions are used in conjunction with protection domains to implement security policies that allow trusted code to access more resources than untrusted code.
  • a security policy thus established determines what actions code executor 410 will allow the code within code stream 420 to perform.
  • the use of typed permissions and protection domains allows policies that go beyond a simple trusted untrusted dichotomy by allowing relatively complex permission groupings and relationships.
  • Protection domains are used to enforce security within computer systems.
  • a protection domain is a set of permissions granted to one or more principals. As described above, permissions are represented by permission objects. Libraries, usually located in trusted sources, contain class definitions for the permission super class 210 and permission classes. Typically these libraries are accessible by code being executed by code executor 410. The correlation between permissions and principals constitutes the policy of the system.
  • Figure 4 illustrates an exemplary policy implemented through use of a policy file 444.
  • a protection domain in this exemplary policy is defined as the set of permissions granted to the objects associated with a particular code source.
  • the policy of the system is represented by one or more files containing instructions.
  • the instructions map code sources to permission objects which represent the permissions authorized for the protections domain corresponding to the code source. Each instruction establishes a mapping between a particular code source and a particular permission object. An instruction represents one authorized permission for the objects belonging to the classes associated with the code source in the instruction.
  • Policy object 440 provides a mapping of code source to permission objects based on the policy file.
  • Policy object 440 is initialized when code executor 410 is initialized.
  • the policy object 440 parses the policy file 444. For each instruction, a permission object of the permission class designated in the instruction is created using the values of the action and target attributes that are designated in the instruction. Finally, the permission object is mapped to the code source designated in the instruction.
  • a policy data base may contain fields that represent the code source, permission class, action and target. Therefore, it is understood that the techniques described herein are not limited to any specific method of storing a representation of security policy of a computer system.
  • a permission object may in fact have more or less than two fields to initialize.
  • a bank account permission may have an action, account, and maximum amount attribute.
  • the values in instruction corresponding to action, account, and maximum amount attributes would be used to initialize the permission object.
  • the domain mapper object 448 contains a mapping between classes and protection domains objects.
  • Protection domain objects 482 contain a set of permissions. Protection domain objects are associated with the permission objects they contain, and with the classes to which a protection domain object is mapped to by domain mapper object 448.
  • Protection domain objects 482 are created when new classes are received by code executor 410.
  • domain mapper 448 determines whether a protection domain is already associated with the code source. The domain mapper maintains data indicating which protection domains have been created and the code sources associated with the protection domains. If a protection domain is already associated with the code source, the domain mapper adds a mapping of the new class and protection domain to a mapping of classes and protection domains maintained by the domain mapper 448. If a protection domain object is not associated with the code source of the new class, a new protection domain object is created and populated with permissions. The protection domain is populated with those permission that are mapped to the code source of the new class based on the mapping of code sources to permissions in the policy object. Finally, the domain mapper adds a mapping of the new class and protection domain to the mapping of classes and protection domains as previously described.
  • the mapping is stored as static fields in the protection domain class.
  • the protection domain class is the class to which protection domain objects belong. There is only one instance of a static field for a class no matter how many objects belong to the class.
  • the data indicating which protection domains have been created and the code sources associated with the protection domains is stored in static fields of the protection domain class.
  • a mapping between a class and protection domains associated with the class is stored as static fields in the class. Static methods are used to access and update the static data mentioned above. Static methods are invoked on behalf of the entire class, and may be invoked without referencing a specific object.
  • EXEMPLARY ACCESS CONTROL An exemplary method using access controller 480 according to steps shown in Fig. 7 illustrates a use of permission objects.
  • the calling stack, protection domains, and permission objects shown in Fig. 6 are used as an example illustrating the performance of the steps shown in Fig. 7.
  • a code executor such as a Java virtual machine, maintains for each thread or process a call stack of the object methods invoked by the thread or process.
  • the call stack reflects the calling hierarchy between the methods that have been invoked but not yet completed by the thread or process.
  • the call stack includes information identifying the objects with methods on the call stack. For example, assume that a thread executes a.x (where " a" is an object and "x" is a method associated with object "a”). Assume that a.x invokes b.y which invokes c.z. While c.z is executing, the call stack will contain data identifying a.x, b.y, and c.z. At this point, call stack 610, in Fig. 6, represents the calling hierarchy of the methods invoked by the thread but have not yet been completed by the thread. When the thread finishes execution of c.z , the data identifying c.z will be removed from call stack 610.
  • each object represented by the call stack is associated with a protection domain.
  • Object a is associated with protection domain I and object b and object c are associated with protection domain J.
  • Each protection domain object shown in Fig. 6 is associated with permission objects. The association between the objects, protection domain objects, and the permission objects is based on the a domain mapper object 448, policy object 440, policy file 444, and constitutes the security policy with respect to the objects shown in Fig. 6.
  • a thread invokes a.x, b.y, and c.z in the manner described so that call stack 610 is as it appears in Fig. 6.
  • b.y requests an action, the action being to " disenable" " channel-5" .
  • a request is in the form of an attempt to invoke a particular method that performs a particular operation.
  • the particular request is made by object b.
  • a method associated with object b invoked a method that may perform the particular action.
  • a resource manager is an object assigned the responsibility of managing access to its respective resource.
  • object a is the resource manager. It is the resource manager, object a, that receives the request from object b.
  • the resource manager creates a permission object based on the permission required to perform the requested action.
  • the permission required to perform this action is to " disenable” " channel-5" .
  • a permission object belonging to TV subclass 230 is created based on the permission required, using " disenable” and " channel-5" as values for the action and target fields respectively.
  • the permission required to perform a requested action is herein referred to as a required permission.
  • the permission object created on the basis of the permission required is herein referred to as the required permission object. Control passes to step 760.
  • a request is received for a determination of whether the action is authorized. The determination is based on the permission required to perform the action.
  • the resource manager invokes an access controller to determine whether the permission required is authorized for the entity requesting access.
  • the access controller receives the request and a required permission object which was transmitted by the resource manager.
  • step 754 the validation methods of one or more permission objects is invoked in order to determine whether an action is authorized based on the permission required.
  • An action is authorized if every protection domain object associated with an object requesting a determination of whether an action is authorized contains a permission represented by a permission object that encompasses the required permission for the action.
  • the protection domains associated with an object requesting the determination are the protection domain objects associated with each object represented by the calling hierarchy when the request was made. Any protection domain object associated with an object requesting a determination of whether an action is authorized is herein referred to as associated protection domain object.
  • Finding the protection domain objects associated with a given object begins by determining the class of a given object.
  • a code executor such as a Java virtual machine, provides that each object incorporate a method which returns the class of an object. Next, the method of the class/domain mapper that returns the protection domain object associated with a class is invoked.
  • the validation methods of each permission object contained in the protection domain object are invoked passing in the permission required object as a parameter.
  • the validation methods of each permission object contained in the associated protection domain are invoked until a permission object indicates that the permission it represents encompasses the required permission. If none of the permission objects in a protection domain indicates that the permission the permission object encompasses the required permission, then the remainder of the associated protection domain objects are ignored.
  • the access controller first determines the protection domain associated with the first object represented on call stack 610, which is object a.
  • the protection domain associated with object a is protection domain I.
  • the validation method of the first permission object, permission object 282 (in Fig. 6), is invoked, passing in the required permission object as a parameter.
  • the required permission represented by the required permission object is a permission to " disenable" " channel-5" .
  • the validation method of the first permission object is invoked the validation method indicates that the required permission is not encompassed.
  • the validation method of permission object 286 (in Fig. 6) is invoked. The invocation of the validation method of permission object 286 indicates that the required permission is encompassed.
  • the access controller then invokes the validation methods of the permission objects in the next protection domain object, protection domain object J, in the manner described. Each invocation of the validation methods of permission object 622 and permission object 626 indicates that the required permission is not encompassed.
  • step 764 a determination is made of whether the action requested was authorized. If every associated protection domain contains a permission object that represents a permission encompassing the required permission, then the requested action is authorized. When the requested action is authorized, control passes to step 768, where the action is performed before execution of the steps ceases. In this example, because not every protection domain object contained a permission encompassing the required permission, performance of the steps ends. The requested action is not executed.
  • Typed permissions facilitate the establishment of new permissions.
  • a new category of permissions When a new category of permissions is desired, a new subclass is created.
  • the particular rules or policy that govern whether the permissions granted a principal are encompassed by permission in the new category are implemented in the validation method of the new subclass representing permissions in the new subclass.
  • Providing an abstract method for the determining whether a particular permission is encompassed by another establishes an standard interface for determining whether a particular permission represented by an permission object is encompassed by the permission represented by another permission object.
  • the interface can be used and relied upon by any security mechanism.
  • the security mechanisms that use the standard interface automatically effectuate rules or particular policy of a new permission category represented by the new subclass.
  • An object is a record combined with the procedures and functions that manipulate it. All objects of a class have the same fields, and are manipulated by the same procedures and functions ("methods"). An object is said to be an "instance" of the class to which it belongs.
  • the classes used to model both dolphins and dogs might include the fields for the nose, mouth, length and age.
  • the dog class may require a hair color field
  • the dolphin class requires a fin size field.
  • object oriented programming supports "inheritance". Without inheritance, a programmer would have to write one set of code for the dog class, and a second set of code for the dolphin class.
  • the code implementing the fields and methods common to object classes would appear redundantly in both classes. Duplicating code in this manner is very inefficient, especially when the number of common fields and methods is much greater than the number of unique fields. Further, code duplication between classes complicates the process of revising the code, since changes to a common fields will have to be duplicated at multiple places in the code in order to maintain consistency between all classes that have the field. Inheritance allows a hierarchy to be established between classes.
  • the fields and methods of a class automatically become fields and methods of the classes that are based upon the given class in the hierarchy.
  • an "animal" class may be defined to have nose, mouth, length and age fields, with associated methods.
  • a programmer can specify that the dolphin and dog classes "inherit" the animal class.
  • a class which inherits its fields and methods from another class is said to be a subclass of the other class.
  • the other class, the class from which the subclass inherited its fields and methods, is said to be a parent class.
  • the dolphin and dog classes are "subclasses" of the animal class, and the animal class is a parent class of the dog and dolphin classes.
  • the code for the inherited fields and methods is located in the parent class and is not duplicated in any subclasses.
  • the subclasses only contain the code for fields and methods that supplement or override the fields and methods of the parent class. Consequently, all revisions to a parent class automatically apply to all subclasses. For example, if the field "age" is defined as an integer in the animal class and is not overridden in the dog and dolphin classes, then the dog and dolphin classes will include an integer to store an age value. If the animal class is revised so that "age" is defined as a real number, then the dog and dolphin classes will automatically include a real number to store an age value. Note a third or greater level in a hierarchy of a classes can be established.
  • a given class can inherit fields and methods of a class that is itself of a subclass of another class.
  • a class above a particular class in a hierarchy is said be a super class to that particular class.
  • a parent class is a super class to its subclasses, and a super class to any class inheriting from a subclass of that parent class.
  • a class constructor which is similar to a method, is used to initialize the fields of an object when objects belonging to that class are created.
  • the code containing the instructions to perform the operations associated with a method is said to be an implementation of the method.
  • a method may be defined for a class without an implementation.
  • a method with no implementation is said to be an abstract method; a class which contains an abstract method is said to be an abstract class.
  • Abstract classes are useful for establishing a common interface for the subclasses of abstract classes.
  • the interface for an abstract method establishes the name of the method, the data type returned by a method and the data type of the method's parameters.
  • the subclasses of an abstract class is responsible for providing the implementation of the abstract method.
  • Class definitions contained in software are typically created from source code usually received from a programmer.
  • the source code is compiled into the code which can be executed by computer system 100.
  • a programmer using a Java Development Kit enters source code in the Java programming language into a source file.
  • the source code embodies class definitions and other instructions which are used to generate byte code which control the execution of a Java code executor, a virtual machine.
  • the JAVATM virtual machine is described in detail in " The JAVATM Virtual Machine Specification,” by Tim Lindholm and Frank Yellin (Sun Microsystems, Inc.: Addison- Wesley Publishing Co.).
  • the JAVATM programming language is described in detail in " The JAVATM Language Specification,” by James Gosling, Bill Joy and Guy Steele (Sun Microsystems, Inc.: Addison- Wesley Publishing Co.), and related texts in the JAVATM Series published by Addison- Wesley.

Abstract

A method and apparatus for establishing and maintaining complex security rules is provided. The security rules are established through the use of 'permission' classes that take advantage of the power and simplicity various features of object oriented programming, including the ability to inherit attributes and methods. For example, a permission super class is established that defines an interface to a validation method. A permission subclass may then be created which provides an implementation of the validation method. When invoked, the validation method indicates whether a given permission represented by one object belonging to a permission class encompasses the permission represented by another object belonging to a permission class. Classes are also provided for grouping permissions into sets, and for establishing protection domains for classes of objects.

Description

TYPED, PARAMETERIZED, AND EXTENSIBLE ACCESS CONTROL PERMISSIONS
RELATED APPLICATIONS The present application is related to U.S. Patent Application No. 08/988,431, entitled "CONTROLLING ACCESS TO A RESOURCE", filed by Li Gong, on the equal day herewith, (attorney docket no. 3070-007/P2244/TJC), the contents of which are incorporated herein by reference.
The present application is related to U.S. Patent Application No. 08/988,660, entitled "SECURE CLASS RESOLUTION, LOADING, AND DEFINITION", filed by Li Gong, on the equal day herewith, (attorney docket no. 3070-008/P2245/TJC), the contents of which are incorporated herein by reference.
The present application is related to U.S. Patent Application No. 08/988,439, entitled "PROTECTION DOMAINS TO PROVIDE SECURITY IN A COMPUTER SYSTEM", filed by Li Gong, on the equal day herewith, (attorney docket no. 3070-009/P2435/TJC), the contents of which are incorporated herein by reference. FIELD OF THE INVENTION
The present invention relates to security mechanisms in a computer system. BACKGROUND OF THE INVENTION
As the use of computer systems grows, organizations are becoming increasingly reliant upon them. A malfunction in the computer system can severely hamper the operation of such organizations. Thus organizations that use computer systems are vulnerable to users who may intentionally or unintentionally cause the computer system to malfunction.
One way to compromise the security of a computer system is to cause the computer system to execute software that performs harmful actions on the computer system. There are various types of security measures that may be used to prevent a computer system from executing harmful software. One example is to check all software executed by the computer system with a " virus" checker. However, virus checkers only search for very specific software instructions. Many methods of using software to tamper with a computer's resources would not be detected by a virus checker. Another very common measure used to prevent the execution of software that tampers with a computer's resources is the "trusted developers approach" . According to the trusted developers approach, system administrators limit the software that a computer system can access to only software developed by trusted software developers. Such trusted developers may include, for example, well know vendors or in-house developers. Fundamental to the trusted developers approach is the idea that computer programs are created by developers, and that some developers can be trusted to not have produced software that compromises security. Also fundamental to the trusted developers approach is the notion that a computer system will only execute programs that are stored at locations that are under control of the system administrators. Recently developed methods of running applications involve the automatic and immediate execution of software code loaded from remote sources over a network. When the remote sources include computer systems that are outside the control of system administrators, the trusted developers approach does not work. One attempt to adapt the trusted developers approach to systems that can execute code from remote sources is referred to as the sand box method. The sand box method allows all code to be executed, but places restrictions on remote code. Specifically, the sand box method permits all trusted code full access to a computer system's resources and all remote code limited access to a computer system's resources. Trusted code is usually stored locally on the computer system under the direct control of the owners or admimstrators of the computer system, who are accountable for the security of the trusted code.
One drawback to the sandbox approach is that the approach is not very granular. The sandbox approach is not very granular because all remote code is restricted to the same limited set of resources. Very often, there is a need to permit remote code from one source access to one set of computer resources while permitting remote code from another source access to another set of computer resources. For example, there may be a need to limit access to one set of files associated with one bank to remote code loaded over a network from a source associated with that one bank, and limit access to another set of files associated with another bank to remote code loaded over a network from a source associated with the other bank. Providing security measures that allow more granularity than the sand box method involves establishing a complex set of relationships between principals and permissions. A "principal" is an entity in the computer system to which permissions are granted. Examples of principals include processes, objects and threads. A "permission" is an authorization by the computer system that allows a principal to perform a particular action or function. Establishing sets of permissions for principals that may be received from multiple sources on a vast network, such as the Internet, typically requires developing complex security software. After such security software is developed, it must often be changed in order to meet changing security requirements. Often, changing security requirements entail modifying permissions or creating new kinds of permissions. Typically, the security software of a computer system must be reprogrammed to incorporate these new kinds of permissions. Programming security software requires substantial effort and in-depth knowledge about a computer's security mechanisms and a computer's architecture.
Based on the foregoing, it is clearly desirable to develop a method which reduces the effort and in-depth knowledge required to modify permissions established for the sources of code being executed by a computer system. It is further desirable to develop a method which reduces the effort and in-depth knowledge required to create new permissions. SUMMARY OF THE INVENTION
A method and system for providing security using typed and extensible control permissions is provided. According to one aspect of the invention, the establishment and maintenance of complex security rules are enforced in a way that takes advantage of the power and simplicity of the inheritance feature of object oriented programming.
Specifically, a " permission super class" is established from which subclasses may be created. Objects that belong to subclasses of the permission super class represent permissions, and are therefore referred to as permission objects.
The permission subclasses inherit the methods and attributes of the permission super class. According to one embodiment, one of the methods defined by the permission super class and inherited by the permission subclasses is a validation method. Each permission subclass inherits the validation method from the permission super class and provides an implementation of the validation method.
When the validation method is invoked for a particular permission object belonging to a permission subclass, the validation method indicates whether a given permission is encompassed by the permission represented by the particular permission object. For example, the validation method of a permission object PO1 may be invoked to determine whether the permission represented by another permission object PO2 is encompassed in the permission represented by PO1, where both PO1 and PO2 belong to classes that descend from said permission super class. In this we can determine whether a permission to perform a first action, represented by PO1, authorizes a request to perform a second action, which requires a second permission represented by PO2, by invoking the validation method of PO1 to determine whether the first permission represents an authorization to perform the requested second action. According to another aspect of the invention, permissions represent actions on targets.
Thus, a first permission object can specify a first action and a first target, and a second permission object can specify a second action and a second target. A determination is made of the whether the permission represented by the first permission object encompasses the permission represented by the second permission object based on whether the first action implies the second action and the first target implies the second target. In this we can determine, for example, whether a permission to perform a first action on a first target, represented by the first permission object, authorizes a request to perform a second action on second target, which requires a second permission represented by the second object, by determining whether first action implies the second action, and the first target implies the second target. BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which: Figure 1 is a block diagram of a computer system on which the present invention may be implemented;
Figure 2 is a block diagram showing attributes and methods associated with a permission super class and a subclass of the permission super class and permission objects belonging to the subclass of the permission super class in accordance with one embodiment of the present invention;
Figure 3 is a flow chart showing the steps for establishing a permission super class and a subclass of the permission super class in accordance with one embodiment of the present invention;
Figure 4 is a block diagram outlining a security mechanism using permission objects in accordance with one embodiment of the present invention;
Figure 5 is a block diagram showing an exemplary policy file; Figure 6 is a block diagram showing a call stack associated with a thread and the protection domains containing permission objects associated with the objects represented by the call stack in accordance with one embodiment of the present invention; and Figure 7 is a flow chart showing steps followed by a security mechanism to determine whether a particular action is authorized in accordance with one embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
A method and apparatus for providing typed permissions is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. HARDWARE OVERVIEW
Figure 1 is a block diagram that illustrates a computer system 100 upon which an embodiment of the invention may be implemented. Computer system 100 includes a bus 102 or other communication mechanism for communicating information, and a processor 104 coupled with bus 102 for processing information. Computer system 100 also includes a main memory 106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 102 for storing information and instructions to be executed by processor 104. Main memory 106 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 104. Computer system 100 further includes a read only memory (ROM) 108 or other static storage device coupled to bus 102 for storing static information and instructions for processor 104. A storage device 110, such as a magnetic disk or optical disk, is provided and coupled to bus 102 for storing information and instructions. Computer system 100 may be coupled via bus 102 to a display 112, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 114, including alphanumeric and other keys, is coupled to bus 102 for communicating information and command selections to processor 104. Another type of user input device is cursor control 116, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 104 and for controlling cursor movement on display 112. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
The invention is related to the use of computer system 100 for establishing typed permissions. According to one embodiment of the invention, establishing typed permissions is provided by computer system 100 in response to processor 104 executing one or more sequences of one or more instructions contained in main memory 106. Such instructions may be read into main memory 106 from another computer-readable medium, such as storage device 110. Execution of the sequences of instructions contained in main memory 106 causes processor 104 to perform the process steps described herein. In alternative embodiments, hard- wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
The term "computer-readable medium" as used herein refers to any medium that participates in providing instructions to processor 104 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 110. Volatile media includes dynamic memory, such as main memory 106. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 102. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read. Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 104 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 100 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector coupled to bus 102 can receive the data carried in the infra-red signal and place the data on bus 102. Bus 102 carries the data to main memory 106, from which processor 104 retrieves and executes the instructions. The instructions received by main memory 106 may optionally be stored on storage device 110 either before or after execution by processor 104.
Computer system 100 also includes a communication interface 118 coupled to bus 102. Communication interface 118 provides a two-way data communication coupling to a network link 120 that is connected to a local network 122. For example, communication interface 118 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 118 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 118 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 120 typically provides data communication through one or more networks to other data devices. For example, network link 120 may provide a connection through local network 122 to a host computer 124 or to data equipment operated by an
Internet Service Provider (ISP) 126. ISP 126 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 128. Local network 122 and Internet 128 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 120 and through communication interface 118, which carry the digital data to and from computer system 100, are exemplary forms of carrier waves transporting the information.
Computer system 100 can send messages and receive data, including program code, through the network(s), network link 120 and communication interface 118. In the Internet example, a server 130 might transmit a requested code for an application program through Internet 128, ISP 126, local network 122 and communication interface 118. In accordance with the invention, one such downloaded application provides for establishing typed permissions as described herein.
The received code may be executed by processor 104 as it is received, and/or stored in storage device 110, or other non- volatile storage for later execution. In this manner, computer system 100 may obtain application code in the form of a carrier wave. FUNCTIONAL OVERVIEW As mentioned above, systems that allow execution of software from remote sources present difficult security problems. The systems that have been developed to address those problems are complex, often requiring the use of elaborate permission rules to deal with principals received from numerous sources. As the security needs of the systems change, the permission rules must be updated by someone who understands the complexities of the system.
According to one aspect of the invention, the complexities associated with elaborate permission rules and systems are reduced by making use of a powerful object-oriented concept understood by most programmers, known as " inheritance" , to establish relationships between classes of permissions. The general concepts of object orientation, inheritance and classes are described in Appendix I.
As shall be described in greater detail hereafter, a " permission super class" is established from which subclasses may be created. Objects that belong to subclasses of the permission super class represent permissions, and are therefore referred to as permission objects. The permission subclasses inherit the methods and attributes of the permission super class, including a validation method. Each permission subclass provides an implementation of the validation method.
When the validation method is invoked for a particular permission object belonging to a permission subclass, the validation method indicates whether a given permission is encompassed by the permission represented by the particular permission object. For example, the validation method of a permission object PO1 may be invoked to determine whether the permission represented by another permission object PO2 is encompassed in the permission represented by PO1, where both PO1 and PO2 belong to classes that descend from said permission super class.
Because the establishment and management of permissions is implemented around the class and inheritance mechanism that is familiar to most programmers, permission management tends to be simpler and more intuitive. As the security needs of a system changes, the typed permission system provided herein allows easy modification to adapt to the changes, without requiring specialized knowledge of complex security-management techniques.
PERMISSIONS As mentioned above, a permission is an authorization by the computer system that allows a principal to perform a particular action or function. According to one embodiment of the invention, permissions can be organized into categories that correlate to categories of actions that are performed on computer systems. Each category is characterized by one or more attributes shared by all permissions belonging to the category or subcategory. Attributes of each category include an action associated with the permission, and can include various other attributes that further qualify the action attribute, such as a target attribute. A target is any entity, such as a bank account, an adult TV channel, or a computer resource (e.g. files, memory, printers, database records), to which an action is directed.
For example, one common permission category is the file system permission category. A file system permission has an action attribute and a target attribute. The target is a particular file or set of files upon which an action can be performed. The action attribute is an action that can be performed on a file, such as " writing" to a file. The target attribute serves to further qualify the action by limiting the entities upon which the action can be performed. An example of a file system permission is an authorization to "write" (i.e. the action) to a particular file like "/anyfile" (i.e. the target). Note that in the examples provided herein, the file(s) and directory in which the file(s) is contained are represented in a form recognized by those skilled in the art.
Another example of a permission category is a bank account permission for a computer application used to manage bank accounts. A bank account permission can have an action attribute, an account attribute, and an amount attribute. An example of a bank account permission would be an authorization to " withdraw" from bank account " 1233456" an amount of three dollars.
Note that permissions categories can further comprise subcategories that are useful for organizing permissions. For example, a subcategory of a bank account permissions can be permissions associated with a particular bank.
IMPLIED PERMISSIONS One permission can imply another. When one permission implies another permission, that one permission is said to encompass the other permission. For example, a permission to write to a directory, such "c:/" , can imply a permission to write to any file in the directory, such as " c:/thisfile" . Furthermore, an attribute of a permission can imply an attribute of another permission. For example, in some implementations, the action attribute of a permission to " write" implies an action attribute of a permission to " read" . An amount attribute of a permission to withdraw three hundred dollars implies another attribute of a permission to withdraw two hundred dollars. Usually, a permission encompasses another permission when all the permission attributes of one permission imply all the corresponding permission attributes of another permission. For example, a permission to " write" to file " d:/somefile" implies a permission to " read" from file " d:/somefile" because a " write" implies a " read" . However, a permission to " write" to file " d:/somefile" does not imply a permission to " read" from file " d:/otherfile" because " d:/somefile" does not imply " d:/otherfile"
REPRESENTING PERMISSIONS WITH CLASSES AND OBJECTS Using the techniques described herein, classes are used to represent categories of and subcategories of permissions, and objects of those classes are used to represent the particular permissions in a category or subcategory of permissions. A permission represented by a class is herein referred to as a typed permission. Classes used to represent categories of permissions are herein referred to as permission classes. Objects which belong to a permission class are herein referred to as permission objects. Furthermore, the fields of a permission class are used to represent the attributes of the category or subcategory of permissions represented by the permission class.
For example, a FilePermission permission class can represent the category of file system permissions. The FilePermission class can have an action field which corresponds to the action attribute, and a target field which corresponds to the target attribute. Each permission object contains fields with values corresponding to attributes of a particular permission represented by the permission object. For example, a given object belonging to the FilePermission class can have an action field with a value representing a " write" action, and a target field with a value representing the directory " d:/" . In this example, the given object represents a permission to "write" to directory "d:/" . Note that each permission object is an instance of a permission class. Likewise, a permission object and the permission it represents are said to represent an instance of a permission category or subcategory.
THE PERMISSION SUPER CLASS Because all permissions share some common attributes, it is useful -and efficient to represent all categories of permissions with one class that is a super class of all permission classes. The super class for all permission classes is herein referred to as the permission super class. Each permission class is a subclass of the permission super class.
The permission super class contains fields which represent attributes common to all permissions. One such field is an action field, which represents the action attribute common to all permissions.
In addition to sharing attributes, the permission super class establishes a set of common methods that are useful for and inherited by all permission objects, such as a get_action method. The common action method returns a value representing the action field. An implementation for the get_action method may be provided in the permission super class. According to one embodiment, the implementation for the get_action method simply returns the value of the action field.
THE VALIDATION METHOD In addition to implementing a set of common methods shared by permission subclasses, the permission super class also establishes the interface to methods that should be supported by every object but whose implementation depends on the particular permission class of the object. An example of such method is a validation method that indicates whether a permission represented by one permission object encompasses another permission represented by another permission object. As noted earlier, a permission typically encompasses another permission when each attribute of the one permission implies the corresponding attribute of the other permission. Because attributes of one permission category may differ from attributes of another permission category, the permission classes which represent permission categories may contain different sets of fields, thus necessitating a different implementation of the validation method for some of the permission classes. Furthermore, the rules that govern whether a particular attribute implies another attribute may vary from one permission category to another. Hence, the implementation required for the validation methods which carry out the rules can vary.
For example, the FilePermission permission class has an action field and a target field. The target field could represent a file or a set of files (e.g.. "d:/somedirectory/somefile"). A permission class representing a bank account, AccountPermission, can have an action field, an account field, and a maximum amount field. The two permission classes, FilePermission and AccountPermission have a different number attributes and different kinds of attributes.
The rules governing whether one attribute of one permission implies a corresponding attribute of another permission may differ from permission class to permission class as well. Specifically, the implementation of determining whether a permission for one set of files implies a permission for another set of files differs significantly from an implementation that determines whether a permission for one maximum amount implies another amount. It is worth noting that permissions of different permission classes usually cannot encompass each other.
Although the implementation of some methods supported by all permission objects can vary from one permission class to another, the permission super class may be used to ensure that the result type of a method and its parameters can remain constant across all permission classes. Defining the interface to method in the permission super class without providing the implementation for the method establishes an interface that can be relied upon by all objects and object implementers (i.e. programmers) when interacting with permission objects. Those skilled in the art will recognize various techniques can be used to provide such an interface. One method would be to provide a super class with an abstract method that would be implemented by subclasses of the super class. Another method would be to provide a permission super class that defines a default implementation that subclasses can override. A default implementation can be, for example, to always return a value indicating that one permission is not encompassed by another permission. Another method uses Java Interfaces instead of abstract classes. CREATING TYPED PERMISSIONS Techniques for creating and using typed permissions shall now be described with reference to the permission classes shown in Fig. 2. The classes shown in Fig. 2 are used to create objects that represent permissions to manage access to a television (TV). For purposes of illustration, assume that permissions associated with accessing a TV have an action attribute and a target attribute. The action attribute can either be to " watch" , " enable" , or "disenable" a channel. The target attribute represents a particular channel.
Several examples of permission objects representing several TV permissions are shown in Fig. 2. Permission Object 282 represents a permission to "disenable" "channel 5" , and permission objects 286 represents a permission to "watch" " channel 5" . Permission object 282 and permission object 286 are objects belonging to the subclass TV subclass 230. TV subclass 230 is a subclass of permission super class 210.
Referring to Figure 3, in step 310 the attributes of the permission super class are established. In this example, an action field 222 is established for permission super class 210. The action field 222 is a string data type. The action field 222 represents the permission attribute of any category of permission.
In step 320, a validation method and other methods for a permission object are established. In this example, an abstract validation method 224 is provided. The validation method accepts as its first parameter an object reference of the data type (i.e. class) Permission class. Thus an object reference referring to an object belonging to any permission class is an acceptable parameter. The data type of the value returned by the method is Boolean. The Boolean value returned by the validation method indicates whether the permission represented by the permission object referred to by the object reference is encompassed by the permission represented by the permission object whose validation method is invoked. For example, assume X and Y are permission objects. The method invocation X.Validation( Y ) will return True if the permission represented by Y is encompassed in the permission represented by X, and False if the permission represented by Y is not encompassed in the permission represented by X.
According to one embodiment, no implementation of the abstract validation method 224 is provided in permission super class 210. The implementation is left to the subclasses of permission super class 210.
A get_action method is also provided in the permission super class 210. The get_action method returns a string value representing the value contained in the action field 222. An implementation is provided for the get_action method. The implementation merely returns the value of the action field as the return value of the get_action method.
Those skilled in the art will recognize that other methods and attributes can be provided. Only some of these methods and attributes have been illustrated in order to avoid unnecessarily obscuring the techniques described herein. An example code implementation of a permission super class 210 is illustrated below. Although the code example may resemble the JAVA programming language by Sun Microsystems Inc., the example is merely for illustrative purposes and is not meant to be representative of an actual code implementation. abstract class Permission { protected String action; abstract Boolean validate(Permission p);
}
ESTABLISHING PERMISSION SUBCLASSES In step 330, an implementation of the abstract validation method 224 is provided in the form of a validation implementation 242 of a subclass of Permission super class 210. In this example, a TV subclass 230 is defined as a subclass of Permission super class 210. The implementation 242 of abstract validation method 224 includes code which, when executed, initially determines whether the object reference parameter refers to a permission object of same class as that of the permission object whose validation method is being invoked. When the classes of permission objects differ, one permission represented by a permission object does NOT encompass the permission represented by the other permission object because a permission of one category does not encompass a permission of another category. For example, a TV permission does not encompass a file system permission.
Next, the code in the implementation 242 ensures that each attribute of the permission represented by the object reference is implied by each attribute of the permission represented by the object whose validation method is invoked. For example, if the action field and the target field of the permission object referred to by the object reference are identical to the action field and target field of the permission object whose validation method is invoked, then the validation method returns a true Boolean value.
In step 340, attributes and other methods of the TV subclass 230 are established. The other methods may include both new methods, and new implementations that override the implementations of inherited methods. In this example, a target field representing the target attribute of a TV permission is defined. A get_target method 246 is also provided. The get_target method simply returns a string value representing the channel attribute of the permission represented by the TV permission object. An example code implementation of the TV subclass 230 is illustrated below.
Although the code example may resemble the JAVA programming language by Sun Microsystems Inc., the example is merely for illustrative purposes and is not meant to be representative of an actual code implementation. class TV extends Permission { protected String target;
public string get_target() { return target;
}
TV(String a, String t){ action = a; target = t;
}
public Boolean validate(Permission p) { if p instanceof TV = false) return false;
TN reqPerm = (TN)p; if (reqPerm.get_action() != action) return false; if (reqPerm.get_target() != target) return false; return true
}
}
In step 350, the permission super class 210 and subclasses of the permission super class 210 are compiled and placed in a software library. Those skilled in the art are familiar with software tools and techniques used to compile the classes described above and to place them in software libraries. An example of such a tool is the Java Development Kit by Sun Microsystems Inc.
Those skilled in the art will recognize that, in addition to the ones illustrated above, other attributes and methods are possible in permission subclasses. Only some these attributes and methods have been illustrated in order to avoid unnecessarily obscuring the techniques described herein.
Furthermore, techniques described above are not limited to permission classes whose parent class is the permission super class 210. The techniques are applicable to subclasses of other permission classes which themselves are descendants of the permission super class. For example, it may be useful to provide a TV permission class, and then a subclass of the TV permission class that corresponds to a particular cable company.
PERMISSIONCOLLECTION OBJECTS In an embodiment of the invention, a PermissionCoUection super class is provided to allow security admimstrators to easily manage sets of permissions. A PermissionCoUection class is used to create objects that each contain a set of zero or more permission objects. An object that is a subclass of the PermissionCoUection super class is herein referred to as a PermissionCoUection object. A PermissionCoUection object manages a set of permission objects contained by the PermissionCoUection object. A homogenous PermissionCoUection object may only contain permission objects belonging to the same class, a heterogeneous PermissionCoUection object may contain permission objects belonging to different classes.
The PermissionCoUection super class defines several methods. One method returns an enumeration of the permission objects contained in the PermissionCoUection object. Another method, add_permission, adds a permission object to the set of permission objects contained in the PermissionCoUection object. The add_permission method has a parameter of the type Permission. In the case of a homogenous PermissionClass object, for example, the method to add a permission object does not add a permission object if it is not of the same type (i.e. class) as any other permission object already contained in the PermissionCoUection object. The method returns a Boolean flag indicating whether or not a permission object was added.
A group validation method is another method defined by the PermissionCoUection super class. The method accepts one parameter of the data type Permission. The method indicates whether or not any of the permissions represented by the permission objects contained in a PermissionCoUection object encompass the permission represented by the permission object specified by the parameter. The method processes each permission object by invoking each permission objects validation method until either (1) the validation methods of all permission objects in the set have returned False or (2) a validation method for a permission object in the set returns True. A PermissionCoUection object used to manage a set of permission objects can be created directly for the PermissionCoUection super class, or from a subclass of the PermissionCoUection class. A subclass of the PermissionCoUection super class can contain methods that provide functionality specific to a particular permission class.
For example, a PermissionCoUection object for FilePermissions can provide an IsTargetlmplied method. The IsTargetlmplied method indicates whether or not a particular target is implied by another target. For example, the method could syntactically determine whether " /sys/sysfile" is implied by "/sys/*" . SECURITY USING "FINAL" DESIGNATION Many programming languages provide the keyword " final" to designate that something cannot be overridden. For example, if a class X is defined as final, then the compiler will generate an error if subsequent code attempts to define a subclass of class X. Alternatively, a class that is not final may have one or more methods that are declared to be final. For example, class Y may not be final, but class Y may define five methods, three of which are declared to be final. Under these circumstances, the compiler will allow subsequent code to define a subclass of class Y, but the subclass will inherit the three methods as is. The subclass will not be able to override the three inherited methods by defining alternative implementations for the methods.
According to one embodiment of the invention, support for the " final" keyword is combined with permission classes to implement strong but flexible security mechanisms. For example, assume that a first developer defines a FilePermission subclass of the Permission super class. Assume further that the Validation method for the FilePermission class returns True when the invoked permission is " write c:\*" and the input permission is " write c:\sys\config.txt" . The first developer may want to distribute the FilePermission class in a runtime library for use by other developers.
If a user of the library is allowed to create a subclass of the FilePermission class and override the validation method, the security policy programmed into the FilePermission logic may be compromised. For example, security would be compromised if the validate method of the FilePermission class is overridden with logic that returns True when the invoked permission is " write c:\*" and the input permission is " write d:\*" .
For the first developer, it may be critical for the applications developed by the users of the runtime library to reflect the same degree of security as is programmed into the FilePermission logic. To prevent security loopholes, the first developer may declare the FilePermission class to be final. As a result, any user of the library would be unable to use any security policies with respect to file access other than the security policies embodied in the original FilePermission class.
While declaring the FilePermission class to be final will prevent security breaches, it limits the flexibility of the library. For example, users of the library should be allowed to implement security policies with respect to file access that are more restrictive than the FilePermission class policies. Thus, a user of the library may decide to implement a system that requires exact directory matches. In such a system "write c:\*" would encompass "write c:\hello.txt" but would not encompass "write c:\sys\joe.txt" . To allow library users to enforce more restrictive security policies, the FilePermission class may be non-final, while all methods of the class but one are declared as final. The non- final method, which may be called the AdditionalCheck method, may be overridden by the library user. The Validation Method, which is **<nal, may call the AdditionalCheck method as a final step to determine whether a particular permission is encompassed by the invoked permission object. The Boolean value generated by the Validation Method logic are combined in a logical AND operation with the Boolean value generated by the AdditionalCheck method to produce the Boolean value that is ultimately returned by the Validation Method.
Because the value returned by the Validation Method is always false if the validation method logic is false, the security policy employed by the application developed by a library user is at least as restrictive as those embodied in the original FilePermission class logic. However, because the library user is allowed to override the AdditionalCheck method, the library user has the flexibility to implement security rules that are more restrictive than the original FilePermission class logic.
EXEMPLARY SECURITY MECHANISM An exemplary security mechanism illustrating one use of typed permissions is shown in Figure 4. Referring to Fig. 4, the exemplary security mechanism includes a policy file 444, a policy object 440, a domain mapper object 448, an access controller 480, and one or more protection domains 482. The security mechanism is implemented using a code executor 410. Code executor 410 executes code which code executor 410 receives from code stream 420. One example of a code executor is a Java virtual machine. A Java virtual machine interprets code called byte code. Byte code is code generated by a Java compiler from source files containing text. The Java virtual machine is described in detail in Tim Lindholm & Frank Yellin, The Java Virtual Machine Specification (1996).
For the purposes of explanation, it shall be assumed that code from code stream 420 is object oriented software. Consequently, the code is in the form of methods associated with objects that belong to classes. One or more class definitions for a class are contained in code from code stream 420. The fields and methods of the objects belonging to a class are defined by a class definition. These class definitions are used by code executor 410 to create objects which are instances of the classes defined by the class definitions.
These class definitions are generated from source code written by a programmer. For example, a programmer using a Java Development Kit enters source code that conforms to the Java programming language into a source file. The source code embodies class definitions and other instructions which are used to generate byte code which controls the execution of a code executor (i.e. a Java virtual machine). Techniques for defining classes and generating code executed by a code executor, such as a Java virtual machine, are well known to those skilled in the art. Each class defined by a class definition from code stream 420 is associated with a class name 438 and a code source 436. Code executor 410 maintains an association between a class and its class name and code source. The code source represents a source of code from which is code received. A "source of code" is an entity from which computer instructions are received. Examples of sources of code include a file or persistent object stored on a data server connected over a network, a FLASH_EPROM reader that reads instructions stored on a FLASHJEPROM, or a set of system libraries.
The code source may be a composite record containing a uniform resource locator (" URL" ) 434 and set of public cryptographic keys 432. A URL identifies a particular source. The URL is a string used to uniquely identify any server connected to the world wide web. A URL may also be used to designate sources local to computer system 100. Typically, the URL includes the designation of the file and directory of the file that is the source of the code stream that a server is providing. A public cryptographic key, herein referred to as a key, is used to validate the digital signature which may be included in a file used to transport related code and data. Public cryptographic keys and digital signatures are described in Schneier, Applied Cryptography. (1996). The keys may be contained in the file, may be contained in a database associating keys with sources (e.g. URLs), or be accessible using other possible alternative techniques. A class may be associated with the digital signature associated with the file used to transport code defining the class, or the class definition of the class may be specifically associated with a digital signature. A class that is associated with a valid digital signature is referred to as being signed. Valid digital signatures are digital signatures that can be verified by known keys stored in a database. If a class is associated with a digital signature which can not be verified, or the class is not associated with any digital signature, the class is referred to as being unsigned. Unsigned classes may be associated with a default key. A key may be associated with a name, which may be used to look up the key in the database.
While one code source format has been described as including data indicating a cryptographic key and URL, alternate formats are possible. Other information indicating the source of the code, or combinations thereof, may be used to represent code sources. Therefore, it is understood that the present invention, is not limited to any particular format for a code source.
TRUSTED AND UNTRUSTED SOURCES The source of code stream 420 may be from zero or more untrusted sources 424 or zero or more trusted sources 428. Untrusted sources 424 and trusted sources 428 may be file servers, including file servers that are part of the World Wide Web network of servers connected to the Internet. An untrusted source is typically not under the direct control of the operators of computer system 100. Code from untrusted sources is herein referred to as untrusted code. Because untrusted code is considered to pose a high security risk, the set of computer resources that untrusted code may access is usually restricted to those which do not pose security threats. Code from a trusted source is code usually developed by trusted developers. Trusted code is considered to be reliable and pose much less security risk than remote code. Software code which is loaded over the network from a remote source and immediately executed is herein referred to as remote code. Typically, a remote source is a computer system of another separate organization or individual. The remote source is often connected to the Internet. Normally untrusted code is remote code. However, code from sources local to computer system 100 may pose a high security risk. Code from such local sources may be deemed to be untrusted code from an untrusted source. Likewise, code from a particular remote source may be considered to be reliable and to pose relatively little risk, and thus may be deemed to be trusted code from a trusted resource. According to one embodiment of the invention, typed permissions are used in conjunction with protection domains to implement security policies that allow trusted code to access more resources than untrusted code. A security policy thus established determines what actions code executor 410 will allow the code within code stream 420 to perform. The use of typed permissions and protection domains allows policies that go beyond a simple trusted untrusted dichotomy by allowing relatively complex permission groupings and relationships.
Protection domains and policies that may be used in conjunction with typed permissions shall now be described in greater detail with continued reference to Figure 4.
PROTECTION DOMAINS AND POLICIES
Protection domains are used to enforce security within computer systems. A protection domain is a set of permissions granted to one or more principals. As described above, permissions are represented by permission objects. Libraries, usually located in trusted sources, contain class definitions for the permission super class 210 and permission classes. Typically these libraries are accessible by code being executed by code executor 410. The correlation between permissions and principals constitutes the policy of the system. Figure 4 illustrates an exemplary policy implemented through use of a policy file 444. A protection domain in this exemplary policy is defined as the set of permissions granted to the objects associated with a particular code source. The policy of the system is represented by one or more files containing instructions. The instructions map code sources to permission objects which represent the permissions authorized for the protections domain corresponding to the code source. Each instruction establishes a mapping between a particular code source and a particular permission object. An instruction represents one authorized permission for the objects belonging to the classes associated with the code source in the instruction. The format of a typical instruction in the exemplary policy file 444 is:
<" permission" > <URL> <key name> <permission class name> <action> <target> The <URL> and the key corresponding to the <key name> represent a code source. The key name is associated with a key. The key and corresponding key name are stored together in a database. The key name can be used to find the key in the database. The <permission class name> represents data identifying a permission class. The <action> and <target> represents data used to initialize (i.e. using an permission object constructor) the action and target fields in a permission object belonging to the identified permission class. Instruction 520-1 in Fig. 5, for example, is an authorization of a permission to write to any file in "/tmp/*" by any object of the class associated with code source " file://somesource" -" somekey" (i.e. URL-key name).
Referring to Fig. 4, in order to efficiently and conveniently implement the policy and establish protection domains, policy object 440, domain mapper object 448, and one or more protection domain objects 482 are provided. Policy object 440 provides a mapping of code source to permission objects based on the policy file. Policy object 440 is initialized when code executor 410 is initialized. The policy object 440 parses the policy file 444. For each instruction, a permission object of the permission class designated in the instruction is created using the values of the action and target attributes that are designated in the instruction. Finally, the permission object is mapped to the code source designated in the instruction.
While one method for representing the security policy of computer system has been described, other methods are possible. For example, a policy data base may contain fields that represent the code source, permission class, action and target. Therefore, it is understood that the techniques described herein are not limited to any specific method of storing a representation of security policy of a computer system.
Note that even though the instruction illustrated above contains data used to initialize two fields, a permission object may in fact have more or less than two fields to initialize. For example, a bank account permission may have an action, account, and maximum amount attribute. When a bank account permission object is initialized, the values in instruction corresponding to action, account, and maximum amount attributes would be used to initialize the permission object.
The domain mapper object 448 contains a mapping between classes and protection domains objects. Protection domain objects 482 contain a set of permissions. Protection domain objects are associated with the permission objects they contain, and with the classes to which a protection domain object is mapped to by domain mapper object 448.
Protection domain objects 482 are created when new classes are received by code executor 410. When a new class is received, domain mapper 448 determines whether a protection domain is already associated with the code source. The domain mapper maintains data indicating which protection domains have been created and the code sources associated with the protection domains. If a protection domain is already associated with the code source, the domain mapper adds a mapping of the new class and protection domain to a mapping of classes and protection domains maintained by the domain mapper 448. If a protection domain object is not associated with the code source of the new class, a new protection domain object is created and populated with permissions. The protection domain is populated with those permission that are mapped to the code source of the new class based on the mapping of code sources to permissions in the policy object. Finally, the domain mapper adds a mapping of the new class and protection domain to the mapping of classes and protection domains as previously described.
In other embodiments of the invention, instead of storing the mapping of classes to protection domains in a domain mapper object, the mapping is stored as static fields in the protection domain class. The protection domain class is the class to which protection domain objects belong. There is only one instance of a static field for a class no matter how many objects belong to the class. The data indicating which protection domains have been created and the code sources associated with the protection domains is stored in static fields of the protection domain class. Alternatively, a mapping between a class and protection domains associated with the class is stored as static fields in the class. Static methods are used to access and update the static data mentioned above. Static methods are invoked on behalf of the entire class, and may be invoked without referencing a specific object.
EXEMPLARY ACCESS CONTROL An exemplary method using access controller 480 according to steps shown in Fig. 7 illustrates a use of permission objects. The calling stack, protection domains, and permission objects shown in Fig. 6 are used as an example illustrating the performance of the steps shown in Fig. 7.
A code executor, such as a Java virtual machine, maintains for each thread or process a call stack of the object methods invoked by the thread or process. The call stack reflects the calling hierarchy between the methods that have been invoked but not yet completed by the thread or process. The call stack includes information identifying the objects with methods on the call stack. For example, assume that a thread executes a.x (where " a" is an object and "x" is a method associated with object "a"). Assume that a.x invokes b.y which invokes c.z. While c.z is executing, the call stack will contain data identifying a.x, b.y, and c.z. At this point, call stack 610, in Fig. 6, represents the calling hierarchy of the methods invoked by the thread but have not yet been completed by the thread. When the thread finishes execution of c.z , the data identifying c.z will be removed from call stack 610.
Note that each object represented by the call stack is associated with a protection domain. Object a is associated with protection domain I and object b and object c are associated with protection domain J. Each protection domain object shown in Fig. 6 is associated with permission objects. The association between the objects, protection domain objects, and the permission objects is based on the a domain mapper object 448, policy object 440, policy file 444, and constitutes the security policy with respect to the objects shown in Fig. 6.
Assume that a thread invokes a.x, b.y, and c.z in the manner described so that call stack 610 is as it appears in Fig. 6. Referring to Fig. 7, assume that b.y requests an action, the action being to " disenable" " channel-5" . Typically, a request is in the form of an attempt to invoke a particular method that performs a particular operation. In this example, the particular request is made by object b. In other words, a method associated with object b invoked a method that may perform the particular action.
Typically, access to a resource by code being executed by a code executor can only be made by invoking a resource manager. A resource manager is an object assigned the responsibility of managing access to its respective resource. In this example, object a is the resource manager. It is the resource manager, object a, that receives the request from object b. In step 754, the resource manager creates a permission object based on the permission required to perform the requested action. In this example, the permission required to perform this action is to " disenable" " channel-5" . A permission object belonging to TV subclass 230 is created based on the permission required, using " disenable" and " channel-5" as values for the action and target fields respectively. The permission required to perform a requested action is herein referred to as a required permission. The permission object created on the basis of the permission required is herein referred to as the required permission object. Control passes to step 760.
DETERMINING WHETHER AN ACTION IS AUTHORIZED In step 754, a request is received for a determination of whether the action is authorized. The determination is based on the permission required to perform the action. In this example, the resource manager invokes an access controller to determine whether the permission required is authorized for the entity requesting access. The access controller receives the request and a required permission object which was transmitted by the resource manager.
In step 754, the validation methods of one or more permission objects is invoked in order to determine whether an action is authorized based on the permission required. An action is authorized if every protection domain object associated with an object requesting a determination of whether an action is authorized contains a permission represented by a permission object that encompasses the required permission for the action.
The protection domains associated with an object requesting the determination are the protection domain objects associated with each object represented by the calling hierarchy when the request was made. Any protection domain object associated with an object requesting a determination of whether an action is authorized is herein referred to as associated protection domain object. Finding the protection domain objects associated with a given object begins by determining the class of a given object. A code executor, such as a Java virtual machine, provides that each object incorporate a method which returns the class of an object. Next, the method of the class/domain mapper that returns the protection domain object associated with a class is invoked.
For each of the associated protection domain objects, the validation methods of each permission object contained in the protection domain object are invoked passing in the permission required object as a parameter. The validation methods of each permission object contained in the associated protection domain are invoked until a permission object indicates that the permission it represents encompasses the required permission. If none of the permission objects in a protection domain indicates that the permission the permission object encompasses the required permission, then the remainder of the associated protection domain objects are ignored.
In this example, the access controller first determines the protection domain associated with the first object represented on call stack 610, which is object a. The protection domain associated with object a is protection domain I. The validation method of the first permission object, permission object 282 (in Fig. 6), is invoked, passing in the required permission object as a parameter. As mentioned earlier, the required permission represented by the required permission object is a permission to " disenable" " channel-5" . When the validation method of the first permission object is invoked the validation method indicates that the required permission is not encompassed. Next, the validation method of permission object 286 (in Fig. 6) is invoked. The invocation of the validation method of permission object 286 indicates that the required permission is encompassed.
The access controller then invokes the validation methods of the permission objects in the next protection domain object, protection domain object J, in the manner described. Each invocation of the validation methods of permission object 622 and permission object 626 indicates that the required permission is not encompassed.
At step 764, a determination is made of whether the action requested was authorized. If every associated protection domain contains a permission object that represents a permission encompassing the required permission, then the requested action is authorized. When the requested action is authorized, control passes to step 768, where the action is performed before execution of the steps ceases. In this example, because not every protection domain object contained a permission encompassing the required permission, performance of the steps ends. The requested action is not executed.
Typed permissions facilitate the establishment of new permissions. When a new category of permissions is desired, a new subclass is created. The particular rules or policy that govern whether the permissions granted a principal are encompassed by permission in the new category are implemented in the validation method of the new subclass representing permissions in the new subclass. Providing an abstract method for the determining whether a particular permission is encompassed by another establishes an standard interface for determining whether a particular permission represented by an permission object is encompassed by the permission represented by another permission object. The interface can be used and relied upon by any security mechanism. The security mechanisms that use the standard interface automatically effectuate rules or particular policy of a new permission category represented by the new subclass.
In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
APPENDIX I OBJECT ORIENTATION AND INHERITANCE In object oriented programming, the world is modeled in terms of objects. An object is a record combined with the procedures and functions that manipulate it. All objects of a class have the same fields, and are manipulated by the same procedures and functions ("methods"). An object is said to be an "instance" of the class to which it belongs.
Sometimes an application requires the use of classes that are similar, but not identical. For example, the classes used to model both dolphins and dogs might include the fields for the nose, mouth, length and age. However, the dog class may require a hair color field, while the dolphin class requires a fin size field.
To facilitate programming in situations in which an application requires multiple similar fields, object oriented programming supports "inheritance". Without inheritance, a programmer would have to write one set of code for the dog class, and a second set of code for the dolphin class. The code implementing the fields and methods common to object classes would appear redundantly in both classes. Duplicating code in this manner is very inefficient, especially when the number of common fields and methods is much greater than the number of unique fields. Further, code duplication between classes complicates the process of revising the code, since changes to a common fields will have to be duplicated at multiple places in the code in order to maintain consistency between all classes that have the field. Inheritance allows a hierarchy to be established between classes. The fields and methods of a class automatically become fields and methods of the classes that are based upon the given class in the hierarchy. For example, an "animal" class may be defined to have nose, mouth, length and age fields, with associated methods. To add these fields and methods to the dolphin and dog classes, a programmer can specify that the dolphin and dog classes "inherit" the animal class. A class which inherits its fields and methods from another class is said to be a subclass of the other class. The other class, the class from which the subclass inherited its fields and methods, is said to be a parent class. In this example, the dolphin and dog classes are "subclasses" of the animal class, and the animal class is a parent class of the dog and dolphin classes. The code for the inherited fields and methods is located in the parent class and is not duplicated in any subclasses. The subclasses only contain the code for fields and methods that supplement or override the fields and methods of the parent class. Consequently, all revisions to a parent class automatically apply to all subclasses. For example, if the field "age" is defined as an integer in the animal class and is not overridden in the dog and dolphin classes, then the dog and dolphin classes will include an integer to store an age value. If the animal class is revised so that "age" is defined as a real number, then the dog and dolphin classes will automatically include a real number to store an age value. Note a third or greater level in a hierarchy of a classes can be established. A given class can inherit fields and methods of a class that is itself of a subclass of another class. A class above a particular class in a hierarchy is said be a super class to that particular class. Thus a parent class is a super class to its subclasses, and a super class to any class inheriting from a subclass of that parent class.
METHODS AND ABSTRACT CLASSES The methods of classes accept zero or more parameters. A class constructor, which is similar to a method, is used to initialize the fields of an object when objects belonging to that class are created. The code containing the instructions to perform the operations associated with a method is said to be an implementation of the method. A method may be defined for a class without an implementation. A method with no implementation is said to be an abstract method; a class which contains an abstract method is said to be an abstract class.
Abstract classes are useful for establishing a common interface for the subclasses of abstract classes. The interface for an abstract method establishes the name of the method, the data type returned by a method and the data type of the method's parameters. The subclasses of an abstract class is responsible for providing the implementation of the abstract method.
For example, assume that it is desired that all objects provide an interface which includes a method that indicates the number of legs an animal has. An abstract class, named animal, with an abstract method called get_legs that returns an integer representing the number of legs can be defined. Every subclass of the animal class would be responsible for providing code which implements the get_legs method for the particular type of animal represented by the subclass. For example, a cow subclass would provide a specific implementation for get_legs that returned the integer four when the get_legs method of a cow object was invoked.
The fields and methods of a class are defined by a class definition in software. Class definitions contained in software are typically created from source code usually received from a programmer. The source code is compiled into the code which can be executed by computer system 100. For example, a programmer using a Java Development Kit enters source code in the Java programming language into a source file. The source code embodies class definitions and other instructions which are used to generate byte code which control the execution of a Java code executor, a virtual machine. The JAVA™ virtual machine is described in detail in " The JAVA™ Virtual Machine Specification," by Tim Lindholm and Frank Yellin (Sun Microsystems, Inc.: Addison- Wesley Publishing Co.). The JAVA™ programming language is described in detail in " The JAVA™ Language Specification," by James Gosling, Bill Joy and Guy Steele (Sun Microsystems, Inc.: Addison- Wesley Publishing Co.), and related texts in the JAVA™ Series published by Addison- Wesley.

Claims

CLAIMS What is claimed is:
1. A method for providing security, the method comprising the steps of: establishing a permission class; wherein each permission object that is a member of said permission class represents at least one permission to perform an action; wherein said permission class includes a validation method; wherein said validation method, when invoked for a particular permission object belonging to said permission class, indicates whether a specified permission is encompassed by a permission represented by the particular permission object.
2. The method of Claim 1 , wherein: the step of establishing a permission class includes establishing a permission subclass that is a descendant of a permission super class; the permission super class defines an interface of said validation method.
3. The method of Claim 2, further including the steps of: obtaining a first permission object, wherein said first permission object belongs to said permission subclass; obtaining a second object, wherein said second object belongs to a descendent class of the permission super class; and determining whether a first permission represented by said first permission object encompasses a second permission represented by said second object by invoking a validation method associated with said first permission object.
4. The method of Claim 3, wherein the step of obtaining a second object includes obtaining a second object that belongs to said permission subclass.
5. The method of Claim 3, wherein the step of obtaining a second object includes obtaining a second object that belongs to a class that is different from said permission subclass.
6. The method of Claim 5, wherein: the method further includes the step of receiving a request to perform a particular action; and the step of obtaining said second object includes the step of obtaining said second object based on said request to perform said particular action.
7. The method of Claim 6, wherein the step of determining whether said first permission represented by said first permission object encompasses said second permission represented by said second object includes sending to the validation method of said first object data that identifies the second object.
8. The method of Claim 4, further including the steps of: obtaining a first permission object, wherein said first permission object belongs to said permission subclass, wherein said first permission object specifies a first action and a first target; obtaining a second object, wherein said second object belongs to a descendent class of the permission super class, wherein said second object specifies a second action and a second target; and determining whether a first permission represented by said first permission object encompasses a second permission represented by said second object by determining whether said first action encompasses said second action and determining whether said first target encompasses said second target.
9. The method of Claim 3, further including the steps of obtaining a permission collection object associated with a plurality of permission objects, wherein said permission collection object includes a group validation method which, when invoked, indicates whether a specified permission is encompassed by at least one permission represented by said plurality of permission objects.
10. The method of Claim 3 , wherein: the step of establishing a permission class includes establishing a permission subclass that is a descendant of a permission super class; and the permission super class defines an interface of said validation method without providing an implementation for said validation method.
11. A computer-readable medium carrying one or more sequences of one or more instructions, wherein the execution of the one or more sequences of the one or more instructions causes the one or more processors to perform the steps of: wherein each permission object that is a member of said permission class represents at least one permission to perform an action; wherein said permission class includes a validation method; wherein said validation method, when invoked for a particular permission object belonging to said permission class, indicates whether a specified permission is encompassed by a permission represented by the particular permission object.
12. The computer readable medium of Claim 11 , wherein: the step of establishing a permission class includes establishing a permission subclass that is a descendant of a permission super class; and the permission super class defines an interface of said validation method.
13. The computer readable medium of Claim 12, further including one or more instructions for performing the steps of: obtaining a first permission object, wherein said first permission object belongs to said permission subclass; obtaining a second object, wherein said second object belongs to a descendent class of the permission super class; and determining whether a first permission represented by said first permission object encompasses a second permission represented by said second object by invoking a validation method associated with said first permission object.
14. The computer readable medium of Claim 13, wherein: the computer readable medium further includes one or more instructions for performing the step of receiving a request to perform a particular action; and the step of obtaining said second object includes the step of obtaining said second object based on said request to perform said particular action.
15. The computer readable medium of Claim 14, wherein the step of determining whether said first permission represented by said first permission object encompasses said second permission represented by said second object includes sending to the validation method of said first object data that identifies the second object.
16. The computer readable medium of Claim 12, further including one or more instructions for performing the steps of: obtaining a first permission object, wherein said first permission object belongs to said permission subclass, wherein said first permission object specifies a first action and a first target; obtaining a second object, wherein said second object belongs to a descendent class of the permission super class, wherein said second object specifies a second action and a second target; and determining whether a first permission represented by said first permission object encompasses a second permission represented by said second object by determining whether said first action encompasses said second action and determining whether said first target encompasses said second target.
17. The computer readable medium of Claim 11 , further including one or more instructions for performing the steps of obtaining a permission collection object associated with a plurality of permission objects, wherein said permission collection object includes a group validation method which, when invoked, indicates whether a specified permission is encompassed by at least one permission represented by said plurality of permission objects.
18. The computer readable medium of Claim 11 , wherein: the step of establishing a permission class includes establishing a permission subclass that is a descendant of a permission super class; and the permission super class defines an interface of said validation method without providing an implementation for said validation method.
19. A computer system comprising: a processor; a memory coupled to said processor; said processor being configured to establish a permission super class, wherein the permission super class defines an interface of a validation method; and said processor being configured to establish a permission subclass of the permission super class, wherein said permission subclass provides an implementation for said validation method, wherein said validation method, when invoked for a particular permission object belonging to said permission subclass, indicates whether a given permission is encompassed within a permission that is represented by said particular permission object.
20. The computer system of Claim 19, wherein the permission super class defines said interface of said validation method without defining any implementation of the validation method.
21. The computer system of Claim 19,wherein: said processor is configured to create a first permission object in said memory; said first permission object belongs to said permission subclass; said processor is configured to create a second object in said memory, said second object belongs to a descendant class of the permission super class; and said processor is configured to determine whether a first permission represented by said first permission object encompasses a second permission represented by said second object by invoking a validation method associated with said first permission object.
22. The computer system of Claim 21 , wherein: said processor is configured to receive a request to perform a particular action; and said processor is configured to create said second object by obtaining said second object based on said request to perform said particular action.
23. The computer system of Claim 22, wherein said processor is configured to determine whether said first permission represented by said first permission object encompasses said second permission represented by said second object by passing as a parameter to the validation method of said first object data that identifies the second object.
24. The computer system of Claim 19, wherein: said processor is configured to create a first permission object in said memory; said first permission object belongs to said permission subclass; said first permission object specifies a first action and a first target; said processor is configured to create a second object in said memory; said second object belongs to a subclass of the permission super class; said second object specifies a second action and a second target; and said processor is configured to determine whether a first permission represented by said first permission object encompasses a second permission represented by said second object by determining whether said first action encompasses said second action and determining whether said first target encompasses said second target.
PCT/US1998/026077 1997-12-11 1998-12-10 Typed, parameterized, and extensible access control permissions WO1999030218A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU17183/99A AU1718399A (en) 1997-12-11 1998-12-10 Typed, parameterized, and extensible access control permissions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/988,857 1997-12-11
US08/988,857 US6047377A (en) 1997-12-11 1997-12-11 Typed, parameterized, and extensible access control permissions

Publications (1)

Publication Number Publication Date
WO1999030218A1 true WO1999030218A1 (en) 1999-06-17

Family

ID=25534547

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/026077 WO1999030218A1 (en) 1997-12-11 1998-12-10 Typed, parameterized, and extensible access control permissions

Country Status (3)

Country Link
US (1) US6047377A (en)
AU (1) AU1718399A (en)
WO (1) WO1999030218A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002077793A1 (en) * 2001-03-26 2002-10-03 Geo Trust, Inc. Defining content zones
US7003661B2 (en) 2001-10-12 2006-02-21 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US7114177B2 (en) 2001-03-28 2006-09-26 Geotrust, Inc. Web site identity assurance
US7694135B2 (en) 2004-07-16 2010-04-06 Geotrust, Inc. Security systems and services to provide identity and uniform resource identifier verification

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317868B1 (en) * 1997-10-24 2001-11-13 University Of Washington Process for transparently enforcing protection domains and access control as well as auditing operations in software components
US6772350B1 (en) * 1998-05-15 2004-08-03 E.Piphany, Inc. System and method for controlling access to resources in a distributed environment
US6131165A (en) * 1998-06-18 2000-10-10 Sun Microsystems, Inc. Permit for controlling access to services in protected memory systems
US6948183B1 (en) * 1998-06-18 2005-09-20 General Instrument Corporation Dynamic security for digital television receivers
US6735701B1 (en) 1998-06-25 2004-05-11 Macarthur Investments, Llc Network policy management and effectiveness system
US6754831B2 (en) * 1998-12-01 2004-06-22 Sun Microsystems, Inc. Authenticated firewall tunneling framework
US6601171B1 (en) * 1999-02-18 2003-07-29 Novell, Inc. Deputization in a distributed computing system
JP4083925B2 (en) * 1999-06-24 2008-04-30 株式会社日立製作所 Information processing apparatus, card member, and information processing system
JP3756352B2 (en) * 1999-06-29 2006-03-15 富士通株式会社 Compiler device and computer-readable recording medium recording compiler
US7536561B2 (en) 1999-10-15 2009-05-19 Ebrary, Inc. Method and apparatus for improved information transactions
US8311946B1 (en) * 1999-10-15 2012-11-13 Ebrary Method and apparatus for improved information transactions
US6430561B1 (en) * 1999-10-29 2002-08-06 International Business Machines Corporation Security policy for protection of files on a storage device
US6704787B1 (en) * 1999-12-03 2004-03-09 Intercard Payments, Inc. Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party
SE518491C2 (en) * 2000-10-12 2002-10-15 Abb Ab Computer based system and method for access control of objects
US20020143724A1 (en) * 2001-01-16 2002-10-03 International Business Machines Corporation Method, system and computer program product to partition filter rules for efficient enforcement
US7277953B2 (en) * 2001-04-18 2007-10-02 Emc Corporation Integrated procedure for partitioning network data services among multiple subscribers
US20020198931A1 (en) * 2001-04-30 2002-12-26 Murren Brian T. Architecture and process for presenting application content to clients
US7346921B2 (en) * 2001-04-30 2008-03-18 Ge Capital Corporation Definition of low-level security rules in terms of high-level security concepts
US7519546B2 (en) * 2001-04-30 2009-04-14 General Electric Company Maintaining synchronization of information published to multiple subscribers
US20030009433A1 (en) * 2001-04-30 2003-01-09 Murren Brian T. Automatic identification of computer program attributes
US20030078949A1 (en) * 2001-04-30 2003-04-24 Scholz Bernhard J. Automatic generation of forms with input validation
US7076804B2 (en) * 2001-05-11 2006-07-11 International Business Machines Corporation Automated program resource identification and association
US20020184520A1 (en) * 2001-05-30 2002-12-05 Bush William R. Method and apparatus for a secure virtual machine
US7962950B2 (en) * 2001-06-29 2011-06-14 Hewlett-Packard Development Company, L.P. System and method for file system mandatory access control
US7093298B2 (en) * 2001-08-30 2006-08-15 International Business Machines Corporation Apparatus and method for security object enhancement and management
US8387111B2 (en) * 2001-11-01 2013-02-26 International Business Machines Corporation Type independent permission based access control
US20030084325A1 (en) * 2001-11-01 2003-05-01 International Business Machines Corporation Method and apparatus for implementing permission based access control through permission type inheritance
AU2003212412B2 (en) * 2002-02-27 2009-01-08 Opentv, Inc. A method and apparatus for providing a hierarchical security profile object
US6993665B2 (en) * 2002-05-01 2006-01-31 Sun Microsystems, Inc. Applet permissions manager
US20070027910A1 (en) * 2002-09-12 2007-02-01 Buss Duane F Enforcing security on attributes of objects
US7058964B2 (en) * 2002-12-03 2006-06-06 Matsushita Electric Industrial Co., Ltd. Flexible digital cable network architecture
US7653936B2 (en) * 2003-06-25 2010-01-26 Microsoft Corporation Distributed expression-based access control
US7343620B2 (en) * 2003-08-13 2008-03-11 International Business Machines Corporation Method and apparatus for adopting authorizations
US20050132054A1 (en) * 2003-12-10 2005-06-16 International Business Machines Corporation Fine-grained authorization by traversing generational relationships
US7546640B2 (en) * 2003-12-10 2009-06-09 International Business Machines Corporation Fine-grained authorization by authorization table associated with a resource
US7313820B2 (en) * 2003-12-29 2007-12-25 International Business Machines Corporation Method and system for providing an authorization framework for applications
US8863277B2 (en) * 2004-04-07 2014-10-14 Fortinet, Inc. Systems and methods for passing network traffic content
US7680935B2 (en) * 2004-09-30 2010-03-16 Microsoft Corporation Entity domains
US7600256B2 (en) * 2005-02-04 2009-10-06 Microsoft Corporation Security critical data containers
US7840564B2 (en) 2005-02-16 2010-11-23 Ebrary System and method for automatic anthology creation using document aspects
US7433869B2 (en) 2005-07-01 2008-10-07 Ebrary, Inc. Method and apparatus for document clustering and document sketching
JP4158826B2 (en) * 2006-10-26 2008-10-01 コニカミノルタビジネステクノロジーズ株式会社 Image processing apparatus, processing method, and image processing program
JP4158827B2 (en) * 2006-10-27 2008-10-01 コニカミノルタビジネステクノロジーズ株式会社 Image processing apparatus, processing method, and image processing program
US8443188B2 (en) * 2006-11-30 2013-05-14 Microsoft Corporation Using code access security for runtime accessibility checks
EP2031916B1 (en) * 2007-07-27 2011-12-21 Research In Motion Limited Administration of policies for wireless devices in a wireless communication system
EP2112842B1 (en) 2007-07-27 2013-08-21 Research In Motion Limited Wireless communication systems
EP2034776B1 (en) 2007-07-27 2013-02-13 Research In Motion Limited Wireless communication system installation
ATE495622T1 (en) 2007-07-27 2011-01-15 Research In Motion Ltd DEVICE AND METHOD FOR COORDINATION OF WIRELESS SYSTEMS
US8914009B2 (en) * 2007-07-27 2014-12-16 Blackberry Limited Administration of wireless systems
EP2034775B1 (en) 2007-07-27 2010-05-26 Research In Motion Limited Apparatus and methods for operation of a wireless server
US8887271B2 (en) * 2009-06-15 2014-11-11 Sap Se Method and system for managing object level security using an object definition hierarchy
US9208338B2 (en) * 2012-07-26 2015-12-08 Adobe Systems Incorporated Method and apparatus for securely executing multiple actions using less than a corresponding multiple of privilege elevation prompts

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2259590A (en) * 1991-09-14 1993-03-17 Int Computers Ltd Modifying a cryptographic facility of a data processing system
GB2308688A (en) * 1995-12-29 1997-07-02 Ibm Controlling access to objects in an information handling system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4919545A (en) * 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US5261102A (en) * 1991-03-28 1993-11-09 International Business Machines Corporation System for determining direct and indirect user access privileges to data base objects
US5421011A (en) * 1991-12-20 1995-05-30 International Business Machines Corporation Method and system for access and accounting control in a data processing system by using a single resource account for a user or a group of users
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5577252A (en) * 1993-07-28 1996-11-19 Sun Microsystems, Inc. Methods and apparatus for implementing secure name servers in an object-oriented system
JP3488500B2 (en) * 1994-02-07 2004-01-19 富士通株式会社 Distributed file system
US5742759A (en) * 1995-08-18 1998-04-21 Sun Microsystems, Inc. Method and system for facilitating access control to system resources in a distributed computer system
US5787427A (en) * 1996-01-03 1998-07-28 International Business Machines Corporation Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5781633A (en) * 1996-07-01 1998-07-14 Sun Microsystems, Inc. Capability security for transparent distributed object systems

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2259590A (en) * 1991-09-14 1993-03-17 Int Computers Ltd Modifying a cryptographic facility of a data processing system
GB2308688A (en) * 1995-12-29 1997-07-02 Ibm Controlling access to objects in an information handling system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DEAN D ET AL: "JAVA SECURITY: FROM HOTJAVA TO NETSCAPE AND BEYOND", PROCEEDINGS OF THE 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, OAKLAND, CA., MAY 6 - 8, 1996, no. SYMP. 17, 6 May 1996 (1996-05-06), INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, pages 190 - 200, XP000634844 *
HAMILTON M A: "JAVA AND THE SHIFT TO NET-CENTRIC COMPUTING", COMPUTER, vol. 29, no. 8, August 1996 (1996-08-01), pages 31 - 39, XP000632765 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002077793A1 (en) * 2001-03-26 2002-10-03 Geo Trust, Inc. Defining content zones
US7114177B2 (en) 2001-03-28 2006-09-26 Geotrust, Inc. Web site identity assurance
US7552466B2 (en) 2001-03-28 2009-06-23 Geotrust, Inc. Web site identity assurance
US7003661B2 (en) 2001-10-12 2006-02-21 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US7120929B2 (en) 2001-10-12 2006-10-10 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US7562212B2 (en) 2001-10-12 2009-07-14 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US8028162B2 (en) 2001-10-12 2011-09-27 Geotrust, Inc. Methods and systems for automated authentication, processing and issuance of digital certificates
US7694135B2 (en) 2004-07-16 2010-04-06 Geotrust, Inc. Security systems and services to provide identity and uniform resource identifier verification

Also Published As

Publication number Publication date
AU1718399A (en) 1999-06-28
US6047377A (en) 2000-04-04

Similar Documents

Publication Publication Date Title
US6047377A (en) Typed, parameterized, and extensible access control permissions
US6125447A (en) Protection domains to provide security in a computer system
US6192476B1 (en) Controlling access to a resource
US6044467A (en) Secure class resolution, loading and definition
US6389540B1 (en) Stack based access control using code and executor identifiers
Zheng et al. Dynamic security labels and static information flow control
KR100373526B1 (en) Protecting resources in a distributed computer system
US7908640B2 (en) Data handling apparatus and methods
US20060277604A1 (en) System and method for distinguishing safe and potentially unsafe data during runtime processing
Pretschner et al. Representation-independent data usage control
US7730465B2 (en) Mixed types
CN112738194A (en) Access control system for safe operation and maintenance management
Hagimont et al. A protection scheme for mobile agents on Java
Spoto A java framework for smart contracts
US6792596B2 (en) Method and system for protecting resource central programs
Palacz et al. Incommunicado: efficient communication for isolates
Bauer et al. Mechanisms for secure modular programming in Java
Gorla et al. Enforcing security policies via types
Frincke Developing secure objects
Lu et al. A microkernel virtual machine: Building security with clear interfaces
Vitek et al. Secure mobile code: the javaseal experiment
Karami et al. Using Wrappers to Ensure Information-Flow Security for Active Objects with Futures
Alhadidi et al. λ_saop: a security AOP calculus
Evered Bracket capabilities for distributed systems security
Hagimont et al. A Protection Scheme for a CORBA Environmen

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase