Using JDOSecure to introduce role-based permissions to Java Data Objects-based applications

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Java Data Objects specification is designed as lightweight persistence approach. Thus, JDO neither supports user authentication nor role-based authorization. Consequently, users are able to query the entire data store as well as to delete persistent objects without any restriction. The novel security approach JDOSecure was developed at the University of Mannheim to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure introduces role-based permissions to JDO-based applications. In this paper we focuses on how JDOSecure enables Java Data Objects-based applications to deal with role-based permissions. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Merz, M., & Aleksy, M. (2006). Using JDOSecure to introduce role-based permissions to Java Data Objects-based applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4080 LNCS, pp. 449–458). Springer Verlag. https://doi.org/10.1007/11827405_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free