The role of reflective middleware in supporting flexible security policies

Na Xu*, Gordon S. Blair, Per Harald Myrvang, Tage Stabell-Kulø, Paul Grace

*Corresponding author for this work

    Research output: Chapter in Book/Published conference outputConference publication

    Abstract

    Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, security policies must be configured and indeed reconfigured at runtime. In this paper, we propose an approach combining the openness of reflective middleware with the flexibility of programmable security to meet such demands. In particular, we build a security architecture based on the Gridkit reflective middleware platform and the Obol security protocol programming language. The paper then describes a case study that uses flexible policies in order to secure remote procedure calls and secure group communication. We also present the benefits of this approach in terms of flexibility, ease of use and extensibility.

    Original languageEnglish
    Title of host publicationGSEM 2006 - 3rd International Conference on Grid Service Engineering and Management, Co-located with the 7th International Conference on Net.ObjectDays 2006, NODe 2006
    Pages97-112
    Number of pages16
    Publication statusPublished - 1 Dec 2006
    Event3rd International Conference on Grid Service Engineering and Management, GSEM 2006 - Co-located with the 7th International Conference on Net.ObjectDays 2006, NODe 2006 - Erfurt, Germany
    Duration: 18 Sept 200620 Sept 2006

    Conference

    Conference3rd International Conference on Grid Service Engineering and Management, GSEM 2006 - Co-located with the 7th International Conference on Net.ObjectDays 2006, NODe 2006
    Country/TerritoryGermany
    CityErfurt
    Period18/09/0620/09/06

    Fingerprint

    Dive into the research topics of 'The role of reflective middleware in supporting flexible security policies'. Together they form a unique fingerprint.

    Cite this