Describing Access Control Patterns Using Roles
نویسندگان
چکیده
Access control patterns describe access control mechanisms at a high level of abstraction. An access control pattern provides a general solution to a class of access control problems for the confidentiality, integrity and availability of the information resources of software systems. While there has been much literature describing the general solution as to how these patterns enforce access control voluminously, there is little work that describes the patterns in a pattern template using appropriate notations for an easy and quick reference. In this paper, we present pattern descriptions of three commonly used access control patterns (DAC, MAC, RBAC) described in the template of pattern-oriented software architecture (POSA). We use an extension of the UML for representing the structure and behaviors of the patterns to capture variations of pattern realizations. We also attempt to give more details on the problem domain of the patterns to help developers choose an suitable pattern.
منابع مشابه
Role Based Access Mechanism in Cloud Computing: Survey
Cloud Computing provides the people the way to share distributed resources and services that belongs to different organization or sites. In cloud computing at present there is no authorization recycling approach. The aim of the paper is to study an authorization recycling approach using with role-based access control, access decisions are based on the roles that individual users have as part of...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملAn MDA-Based Environment for Generating Access Control Policies
Identity management and access control are essential in the enterprise IT landscape in order to control access to applications and to fulfil laws or regulations. The global competition of enterprises leads to short development cycles and fast changes of IT applications, which requires also an error-free and quick adaption of its security. The modeldriven development of access control policies p...
متن کاملTrust Management Languages and Complexity
Trust management is a concept of automatic verification of access rights against distributed security policies. A policy is described by a set of credentials that define membership of roles and delegation of authority over a resource between the members of roles. Making an access control decision is equivalent to resolving a credential chain between the requester and the role, which members are...
متن کاملThe generalized temporal role mining problem
Role mining, the process of deriving a set of roles from the available user-permission assignments, is considered to be an essential step in successful implementation of Role-Based Access Control (RBAC) systems. Traditional role mining techniques, however, are not equipped to handle temporal extensions of RBAC like the Temporal-RBAC (TRBAC) model. In this paper, we formally define the problem o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006