15.01.2015 Views

4th International Conference on Principles and Practices ... - MADOC

4th International Conference on Principles and Practices ... - MADOC

4th International Conference on Principles and Practices ... - MADOC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 10: Assignment of Permissi<strong>on</strong>s <strong>and</strong> Roles using the RBAC Management Mode<br />

Versi<strong>on</strong> 1.0.1, http://www.jcp.org/en/jsr/detailid=<br />

12, 2004.<br />

[7] Java Community Process. JSR-243: Java Data<br />

Objects 2.0 - An Extensi<strong>on</strong> to the JDO specificati<strong>on</strong>,<br />

Final Release, Versi<strong>on</strong> 2.0, http://www.jcp.org/en/<br />

jsr/detailid=243, 2006.<br />

[8] A. Korthaus <strong>and</strong> M. Merz. A Critical Analysis of JDO<br />

in the C<strong>on</strong>text of J2EE. In A.-A. Ban, H. Arabnia,<br />

<strong>and</strong> M. Youngs<strong>on</strong>g, editors, <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g><br />

<strong>on</strong> Software Engineering Research <strong>and</strong> Practice<br />

(SERP ’03), volume I, pages 34–40. CSREA, 2003.<br />

[9] M. Merz. JDOSecure: A Security Architecture for the<br />

Java Data Objects-Specificati<strong>on</strong>. 15th <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g><br />

<str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> <strong>on</strong> Software Engineering <strong>and</strong> Data<br />

Engineering (SEDE-2006), 6.-8. July, Los Angeles,<br />

California, USA, 2006.<br />

[10] M. Merz. Using the Dynamic Proxy Approach to<br />

Introduce Role-Based Security to Java Data Objects.<br />

18th <str<strong>on</strong>g>Internati<strong>on</strong>al</str<strong>on</strong>g> <str<strong>on</strong>g>C<strong>on</strong>ference</str<strong>on</strong>g> <strong>on</strong> Software<br />

Engineering <strong>and</strong> Knowledge Engineering (SEKE’06),<br />

5.-7. July, San Francisco, California, USA, 2006.<br />

[11] S. Oaks. Java Security. The Java Series. O’Reilly &<br />

Associates, Inc., Sebastopol, CA, USA, sec<strong>on</strong>d editi<strong>on</strong>,<br />

2001.<br />

[12] Sun Microsystems. JAAS Login C<strong>on</strong>figurati<strong>on</strong> File.<br />

http://java.sun.com/j2se/1.4.2/docs/guide/security/<br />

jaas/tutorials/LoginC<strong>on</strong>figFile.html, 2002.<br />

[13] Sun Microsystems. The Java Language Specificati<strong>on</strong>.<br />

Addis<strong>on</strong>-Wesley Professi<strong>on</strong>al, 3rd editi<strong>on</strong>, 2005.<br />

[14] TheServerSide.COM. Craig Russell Resp<strong>on</strong>ds to<br />

Roger Sessi<strong>on</strong>s’ Critique of JDO.<br />

http://www.theserverside.com/articles/article.tssl=<br />

RusselvsSessi<strong>on</strong>s, 2001.<br />

[15] TheServerSide.COM. A Criticism of Java Data<br />

Objects (JDO). http://www.theserverside.com/news/<br />

thread.tssthread id=8571, 2003.<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!