Database and Expert Systems Applications

Volume 4080 of the series Lecture Notes in Computer Science pp 449-458

Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications

  • Matthias MerzAffiliated withDepartment of Information Systems III, University of Mannheim
  • , Markus AleksyAffiliated withDepartment of Information Systems III, University of Mannheim

* Final gross prices may vary according to local VAT.

Get Access


The Java Data Objects specification is designed as lightweight persistence approach. Thus, JDO neither supports user authentication nor role-based authorization. Consequently, users are able to query the entire data store as well as to delete persistent objects without any restriction. The novel security approach JDOSecure was developed at the University of Mannheim to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure introduces role-based permissions to JDO-based applications. In this paper we focuses on how JDOSecure enables Java Data Objects-based applications to deal with role-based permissions.