Access Graphs: Another View on Static Access Control for a Better Understanding and Use

نویسندگان

  • Gilles Ardourel
  • Marianne Huchard
چکیده

Encapsulation and modularity are supported by various static access control mechanisms that manage implementation hiding and define interfaces adapted to different client profiles. Programming languages use a broad range of different mechanisms, that are sometimes confusing and hard to predict when cumulatively applied. Furthermore, understanding and reasoning about access control independently from the programming languages is quite difficult. We introduce a notation for static access control that we think is adapted for modeling, characterizing, evaluating, comparing and translating access control. Examples of practical applications of access graphs are given. This notation is supported by AGATE, a set of tools designed for access control handling.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the method of achieving technology upstream of Iran's oil and gas industry using game theory in two modes of cooperation (transfer) and non-cooperation (independence)

Access to technology in the upstream oil and gas industry is one of the most challenging issues. In this industry, in order to be able to apply the desired effects of technology in the economic and development dimension, in the decision-making process, the choice to acquire technology must be such as to avoid repeating the ineffective approaches of the past. However, the most divisive And expli...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Understanding the roles of different stakeholders influencing the use of mobile phones to access agricultural information: A Case of Kilolo and Kilosa Districts, Tanzania

The study investigated the roles of different stakeholders influencing the use of mobile phones in accessing agricultural information in Tanzania. While information is becoming an important ingredient in agriculture, farmers in Tanzania suffer the problem of lacking access to agricultural information. Promisingly, mobile phone technology has become the most valued infrastructure which gives peo...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

A Sub-threshold 9T SRAM Cell with High Write and Read ability with Bit Interleaving Capability

This paper proposes a new sub-threshold low power 9T static random-access memory (SRAM) cell compatible with bit interleaving structure in which the effective sizing adjustment of access transistors in write mode is provided  by isolating writing and reading paths. In the proposed cell, we consider a weak inverter to make better write mode operation. Moreover applying boosted word line feature ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Object Technology

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2002