Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems
نویسندگان
چکیده
This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the military domain, and discuss about an analysis of the resulting model for pattern conformance.
منابع مشابه
Developing Reliable yet Flexible Software through If-Then Model Transformation Rules
Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...
متن کاملA Radon-based Convolutional Neural Network for Medical Image Retrieval
Image classification and retrieval systems have gained more attention because of easier access to high-tech medical imaging. However, the lack of availability of large-scaled balanced labelled data in medicine is still a challenge. Simplicity, practicality, efficiency, and effectiveness are the main targets in medical domain. To achieve these goals, Radon transformation, which is a well-known t...
متن کاملPrediction of Vapor-Liquid Equilibria Using CEOS /GE Models
The present study investigates the use of different GE mixing rules in cubic equations of state for prediction of phase behavior of multicomponent hydrocarbon systems. To predict VLE data in multicomponent symmetric and asymmetric mixtures such as systems that contain light gases (nitrogen, carbon dioxide, etc.) and heavy hydrocarbons, the SRK equation of state has been combined with excess Gib...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملAnalyzing ways of transition in the pattern of urban growth
Today each city due to natural limitations, facilities and planning policies has different growth pattern which according to its spread, has different consequences and results. Although there is a wide range of urban growth patterns, but the important thing is not diversity and number of models but is the absence of rules and methods of transition from one to another pattern (form). So this art...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008