Challenges in Modeling Evolving Access Control Policies using Feature Modeling
نویسندگان
چکیده
With the growth of Enterprises and organizations, the paper-based systems are replaced with software systems. These software systems are built to support a multitude of users with a variety of roles accessing the resources from anywhere and at any time. These operations are regulated through proper definition of Access control policies (Permissions); this plays a major role in protecting the system and its resources. Initially the software developers focused solely on the customer's requirements without concentrating on access control policies [1]. The later inclusion of them in the software system always created problems that resulted in financial loss, data loss and integrity loss of critical systems [2]. The significance of the Access control policies has made the researchers to recommend its adoption in the early phases of the software development. Unlike olden days, today's business processes are evolving day by day. The Access control policies also continually evolve to meet the organization's business needs and customer's interest. This issue is serious because if the evolving Access control policies are not handled properly, the system is continuously vulnerable to data loss, financial loss and integrity loss. The existing works in the literature rarely address the approaches for handling the evolving Access control policies [3]. New abstraction and approaches are needed to represent such policies specific during the software design. This paper discusses research directions that could result in approaches for handling the evolving access control policies in the design phase. This should also ensure the early inclusion of the access control policies at design phase.
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملCan “feature” Be Used to Model the Changing Access Control Policies?
Access control policies [ACPs] regulate the access to data and resources in information systems. These ACPs are framed from the functional requirements and the Organizational security & privacy policies. It was found to be beneficial, when the ACPs are included in the early phases of the software development leading to secure development of information systems. Many approaches are available for...
متن کاملIran’s Shift in Family Planning Policies: Concerns and Challenges
Iran’s significant success in implementing Family Planning (FP) during the past 25 years, has made it a role model in the world. The Total Fertility Rate (TFR) in Iran has dropped from 6.5 in 1960 to 1.6 in 2012, which is well below the targeted value of 2.2 for the country. Iran’s success story, however, did not merely root in the implementation of FP programs. In other words, families’ strong...
متن کاملAn aspect-based approach to modeling access control concerns
Specifying, enforcing and evolving access control policies is essential to prevent security breaches and unavailability of resources. These access control design concerns impose requirements that allow only authorized users to access protected computer-based resources. Addressing these concerns in a design results in the spreading of access control functionality across several design modules. T...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 9 شماره
صفحات -
تاریخ انتشار 2014