Hi Myoungkyu,

Just curious, what kind of security policies are you interested in ?
Can you give an example.

Authorization policies ( role based or other ) that shiro supports
does not necessarily require any byte code manipulation.

thanks

Manoj

On 6/28/09, mksong <[email protected]> wrote:
>
> Thanks for your reply.
>
> For example, Hibernate does not perform any bytecode
> manipulation on its own, but it uses a proxying library that
> creates proxies at the bytecode level.
>
> If you do not manipulate bytecode,
> how do you enforce security policies then?
>
> Regards,
> Myoungkyu
>
>
>
> Les Hazlewood-2 wrote:
>>
>> Hiya,
>>
>> The project (now named Shiro) does not perform bytecode manipulation of
>> any
>> sort.
>>
>> Regards,
>>
>> Les
>>
>> On Sat, Jun 27, 2009 at 11:26 PM, mksong <[email protected]> wrote:
>>
>>>
>>> Hello, All
>>>
>>> I am carring out an experiment on JSecurity's bytecode engineering.
>>>
>>> I tested JSecurity to see if the framework would generate any
>>>
>>> bytecode related to security or add anything to the existing ones.
>>>
>>> With the attached log file, I am not sure if JSecurity does bytecode
>>> engineering or not.
>>> (Here are the log file at loading time and the slide file explaing what I
>>> did:
>>> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/>
>>> http://people.cs.vt.edu/~mksong/jsecurity/<http://people.cs.vt.edu/%7Emksong/jsecurity/>)
>>>
>>> Is it true?
>>>
>>> --
>>> View this message in context:
>>> http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3168851.html
>>> Sent from the Shiro User mailing list archive at Nabble.com.
>>>
>>>
>>
>>
>
> --
> View this message in context:
> http://n2.nabble.com/About-JSecurity%27s-bytecode-engineering-tp3168851p3170891.html
> Sent from the Shiro User mailing list archive at Nabble.com.
>
>

Reply via email to