Adaptive Access Control Enforcement in Social Network Using Aspect Weaving

نویسندگان

  • Frédéric Cuppens
  • Nora Cuppens-Boulahia
  • Eduardo Pena Viña
چکیده

Current social network systems support a large range of applications with very different security requirements. Even if available social network solutions provide some security functionalities, users do not control these functionalities and cannot customize them to handle their specific security needs. In this paper, we suggest a new approach to handle these issues. This approach is based on Aspect Oriented Programming (AOP) which enables the enforcement of an independent, reusable access control policy through the modification of the program at runtime. This makes possible to externalize the security concerns and weave them into an existing social network. Using this approach, it is possible to customize security of social network at different levels. First, one can specify the global security policy of the particular social network application and then, each member of this social network can further refine this global policy to specify their specific security requirements. This approach is illustrated on the open source social network system Elgg.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trace-based Aspects

In this article, we present trace-based aspects which take into account the history of program executions. They are defined in terms of execution traces and may express relations between different events. Weaving is modeled by an execution monitor which modifies the base program execution as defined by the aspects. We motivate trace-based aspects and explore options within the trade-off between...

متن کامل

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC

To facilitate collaboration in the patient-centered medical home (PCMH), our prior work extended the NIST role-based access control (RBAC) model to yield a formal collaboration on duty and adaptive workflow (COD/AWF) model. The next logical step is to place this work into the context of an integrated software process for security engineering from design through enforcement. Towards this goal, w...

متن کامل

PROSE: a study on dynamic AOP

An obvious prerequisite for both fixed and mobile computing is the ability to adapt (i) to different computing environments or (ii) to external changes occurred in their current computing environment. Otherwise the services are forced to be foreseen with everything they may possibly need during their operationallife time. This is neither desirable nor feasible, thereby hinting at the need for d...

متن کامل

Stronger Enforcement of Security Using AOP and Spring AOP

An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tanglin...

متن کامل

An Aspect-oriented Approach to Relating Security Requirements and Access Control Conference Item an Aspect-oriented Approach to Relating Security Requirements and Access Control

Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules represent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012