Integration of Access Control in Information Systems: From Role Engineering to Implementation

نویسندگان

  • Romuald Thion
  • Stéphane Coulondre
چکیده

Pervasive computing and proliferation of smart gadgets make organizations open their information systems, especially by extensive use of mobile technology: information system must be available any-time, any-where. This cannot be performed reasonably without thorough access control policies. Such an access control must be able to deal with user’s profile, time and eventually with other complex contexts like geographical position. This paper shows that it is possible to take into account confidentiality constraints straight into the logical data model in a homogeneous way, for various aspects treated independently (user profile, time, geographical position, etc.). We propose a language called LORAAM which includes a way to express authorizations at the class level. We first present the syntactical aspects, then the semantics of such a language, based on the object-oriented paradigm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

System Engineering Implementation Process for Super-Systems

System engineering is one of the most powerful tools for comprehensive project management and control. This tool emphasized the life cycle of the projects, manages every single activity and helps manage the main elements of the project through a set of management and engineering processes. The goal of the current study is to use a system engineering approach in design phase in order or to meet ...

متن کامل

Universal Access to Surgical Care and Sustainable Development in Sub-Saharan Africa: A Case for Surgical Systems Research; Comment on “Global Surgery – Informing National Strategies for Scaling Up Surgery in Sub-Saharan Africa”

National level experiences, lessons learnt from the Millennium Development Goal (MDG) era coupled with the academic evidence and proposals generated by the Lancet Commission on Global Surgery (LCoGS) together with the economic arguments and recommendations from the World Bank Group’s “Essential Surgery” Disease Control Priorities (DCP3) publication, provided the impetus for political commitment...

متن کامل

Intelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations

Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...

متن کامل

Evaluation of Failure Causes in Employing Hospital Information Systems

Today, the information systems play a critical role in business for each organization. Like other organizations, hospitals use information systems for data collection, data storage, data processing and the like to have long-term and short-term achievements. Despite the very benefits of implementing HIS and its costly implementation, the HIS project sometimes fails. The importance of the HIS fai...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Informatica (Slovenia)

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2006