Adaptive Access Control Enforcement in Social Network Using Aspect Weaving
نویسندگان
چکیده
Current social network systems support a large range of applications with very different security requirements. Even if available social network solutions provide some security functionalities, users do not control these functionalities and cannot customize them to handle their specific security needs. In this paper, we suggest a new approach to handle these issues. This approach is based on Aspect Oriented Programming (AOP) which enables the enforcement of an independent, reusable access control policy through the modification of the program at runtime. This makes possible to externalize the security concerns and weave them into an existing social network. Using this approach, it is possible to customize security of social network at different levels. First, one can specify the global security policy of the particular social network application and then, each member of this social network can further refine this global policy to specify their specific security requirements. This approach is illustrated on the open source social network system Elgg.
منابع مشابه
Trace-based Aspects
In this article, we present trace-based aspects which take into account the history of program executions. They are defined in terms of execution traces and may express relations between different events. Weaving is modeled by an execution monitor which modifies the base program execution as defined by the aspects. We motivate trace-based aspects and explore options within the trade-off between...
متن کاملLeveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC
To facilitate collaboration in the patient-centered medical home (PCMH), our prior work extended the NIST role-based access control (RBAC) model to yield a formal collaboration on duty and adaptive workflow (COD/AWF) model. The next logical step is to place this work into the context of an integrated software process for security engineering from design through enforcement. Towards this goal, w...
متن کاملPROSE: a study on dynamic AOP
An obvious prerequisite for both fixed and mobile computing is the ability to adapt (i) to different computing environments or (ii) to external changes occurred in their current computing environment. Otherwise the services are forced to be foreseen with everything they may possibly need during their operationallife time. This is neither desirable nor feasible, thereby hinting at the need for d...
متن کاملStronger Enforcement of Security Using AOP and Spring AOP
An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tanglin...
متن کاملAn Aspect-oriented Approach to Relating Security Requirements and Access Control Conference Item an Aspect-oriented Approach to Relating Security Requirements and Access Control
Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules represent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012