A Metamodel for Hybrid Access Control Policies
نویسندگان
چکیده
منابع مشابه
A Metamodel for Hybrid Access Control Policies
Modelling is a proven technique to communicate and illustrate complex specifications in a wide range of disciplines. Access control (AC) specification is not an exception in this regard. Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals. In a metamodelling approach where textual languages and visual model...
متن کاملFrom Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach
Security is among the most successful applications of aspectoriented concepts. In particular, in role-based access control, aspects capture access conditions in a quite modular way. The question we address in this paper is how can aspects be generated from access control policies under a validated process? We present a metamodel-based transformation from SecureUML, a rolebased access control la...
متن کاملAccess Control Policies and Languages Access Control Policies and Languages
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and i...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملDatabase Access Control Policies
As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Software
سال: 2015
ISSN: 1796-217X
DOI: 10.17706//jsw.10.7.784-797