Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems

نویسندگان

  • Dae-Kyoo Kim
  • Lunjin Lu
چکیده

This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the military domain, and discuss about an analysis of the resulting model for pattern conformance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Reliable yet Flexible Software through If-Then Model Transformation Rules

Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...

متن کامل

A Radon-based Convolutional Neural Network for Medical Image Retrieval

Image classification and retrieval systems have gained more attention because of easier access to high-tech medical imaging. However, the lack of availability of large-scaled balanced labelled data in medicine is still a challenge. Simplicity, practicality, efficiency, and effectiveness are the main targets in medical domain. To achieve these goals, Radon transformation, which is a well-known t...

متن کامل

Prediction of Vapor-Liquid Equilibria Using CEOS /GE Models

The present study investigates the use of different GE mixing rules in cubic equations of state for prediction of phase behavior of multicomponent hydrocarbon systems. To predict VLE data in multicomponent symmetric and asymmetric mixtures such as systems that contain light gases (nitrogen, carbon dioxide, etc.) and heavy hydrocarbons, the SRK equation of state has been combined with excess Gib...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Analyzing ways of transition in the pattern of urban growth

Today each city due to natural limitations, facilities and planning policies has different growth pattern which according to its spread, has different consequences and results. Although there is a wide range of urban growth patterns, but the important thing is not diversity and number of models but is the absence of rules and methods of transition from one to another pattern (form). So this art...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008