Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications
نویسندگان
چکیده
The utilization of the object-oriented approach to design and develop systems/applications has continued to increase throughout the 1990s. Security concerned users and organizations must now protect and control access to object-oriented systems and applications. This paper frames a paradigm for security in object-oriented systems and applications by addressing the following: Shouldn't security be elevated to a rst-class partner throughout the entire design and development process? What will be the role of existing approaches to security? What characteristics of the object-oriented approach should in uence the approach to its security? How will assurance and consistency be attained during the de nition, usage, and evolution
منابع مشابه
Declarative Semantics in Object-Oriented Software Development - A Taxonomy and Survey
One of the modern paradigms to develop an application is object oriented analysis and design. In this paradigm, there are several objects and each object plays some specific roles in applications. In an application, we must distinguish between procedural semantics and declarative semantics for their implementation in a specific programming language. For the procedural semantics, we can write a ...
متن کاملObjects Identification in Object-Oriented Software Development - A Taxonomy and Survey on Techniques
Analysis and design of object oriented is onemodern paradigms for developing a system. In this paradigm, there are several objects and each object plays some specific roles. Identifying objects (and classes) is one of the most important steps in the object-oriented paradigm. This paper makes a literature review over techniques to identify objects and then presents six taxonomies for them. The f...
متن کاملOn Attributes of Objects in Object-Oriented Software Analysis
One of the modern paradigms to develop a system is object oriented analysis and design. In this paradigm, there are several objects and each object plays some specific roles. There is a sequence of activities to develop an analysis model. In the first step, we work in developing an initial use case model. Then in the second step, they identify a number of concepts and build a glossary of partic...
متن کاملObject-Oriented Method for Automatic Extraction of Road from High Resolution Satellite Images
As the information carried in a high spatial resolution image is not represented by single pixels but by meaningful image objects, which include the association of multiple pixels and their mutual relations, the object based method has become one of the most commonly used strategies for the processing of high resolution imagery. This processing comprises two fundamental and critical steps towar...
متن کاملUser - Role Based Security Enforcement Mechanisms for Object - Oriented Systems and Applications
The successful development of object-oriented applications has heightened interest in the exploration of security for object-oriented programming languages, database systems, and applications. Our past e orts have investigated user-role based security (URBS) for discretionary access control to provide customizable access to the public interface of object types/classes, allowing di erent individ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 5 شماره
صفحات -
تاریخ انتشار 1997