We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invocation (RMI). We automatically build custom proxy objects, and give them to untrusted clients in place of the originals. Proxy objects expose a subset of methods to prevent potentially dangerous calls from clients. We present semantics of our system, an implementation, and its evaluation. The creation of a proxy object takes an order of magnitude less time than the corresponding RMI lookup.
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara