A Metamodel for Hybrid Access Control Policies
نویسندگان
چکیده
Modelling is a proven technique to communicate and illustrate complex specifications in a wide range of disciplines. Access control (AC) specification is not an exception in this regard. Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals. In a metamodelling approach where textual languages and visual models are two equivalent forms of specifications, we propose an AC metamodel, setting the stage for its derived textual language. Our metamodel is characterized by its formal semantics, its modularity and refinement method, and its integration means for concurrent application of multiple reusable AC models. These characteristics enable AC specification with better readability, clarity, unambiguity and properties verification support.
منابع مشابه
Rewrite Specifications of Access Control Policies in Distributed Environments
We define a metamodel for access control that takes into account the requirements of distributed environments, where resources and access control policies may be distributed across several sites. This distributed metamodel is an extension of the category-based metamodel proposed in previous work (from which standard centralised access control models such as MAC, DAC, RBAC, Bell-Lapadula, etc. c...
متن کاملFrom Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach
Security is among the most successful applications of aspectoriented concepts. In particular, in role-based access control, aspects capture access conditions in a quite modular way. The question we address in this paper is how can aspects be generated from access control policies under a validated process? We present a metamodel-based transformation from SecureUML, a rolebased access control la...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملThe G-ACM Tool: using the Drools Rule Engine for Access Control Management
In this paper we explore the usage of rule engines in a graphical framework for visualising dynamic access control policies. We use the Drools rule engine to dynamically compute permissions, following the Category-Based Access Control metamodel.
متن کاملA Logic of Privacy
We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal’s private information may be specified. Our concern is with developing the formal foundations of our conceptual model. For both the specific access control models and privacy policies, which may be defined in terms of the meta-model, we adopt a combining approach: ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 10 شماره
صفحات -
تاریخ انتشار 2015