Patterns and Pattern Diagrams for Access Control
نویسندگان
چکیده
Access control is a fundamental aspect of security. There are many variations of the basic access control models and it is confusing for a software developer to select an appropriate model for her application. The result in practice is that only basic models are used and the power of more advanced models is thus lost. We try to clarify this panorama here through the use of patterns. In particular, we use pattern diagrams to navigate the pattern space. A pattern diagram shows relationships between patterns and we can see how different models relate to each other. A subproduct of our work is the analysis of which patterns are available for use and which need to be written. Pattern maps are also useful to perform semi-automatic model transformations as required for Model-Driven Development (MDD). The idea is to provide the designer of a secure system with a navigation tool that she can use to select an appropriate pattern from a catalog of security patterns. We also indicate how to compose new access control models by adding features to an existing pattern and how to define patterns by analogy.
منابع مشابه
A Bayesian Approach for the Recognition of Control Chart Patterns
In this research, an iterative approach is employed to recognize and classify control chart patterns. To do this, by taking new observations on the quality characteristic under consideration, the Maximum Likelihood Estimator of pattern parameters is first obtained and then the probability of each pattern is determined. Then using Bayes’ rule, probabilities are updated recursively. Finally, when...
متن کاملA New Statistical Approach for Recognizing and Classifying Patterns of Control Charts (RESEARCH NOTE)
Control chart pattern (CCP) recognition techniques are widely used to identify the potential process problems in modern industries. Recently, artificial neural network (ANN) –based techniques are very popular to recognize CCPs. However, finding the suitable architecture of an ANN-based CCP recognizer and its training process are time consuming and tedious. In addition, because of the black box ...
متن کاملAnalysis of residential complexes with the approach of space syntax in terms of mass crime (Case Study: Shiraz Residential complexes)
Various factors affect the degree of mass crime of an environment, including social, economic, and physical factors. The purpose of this research is to investigate the role of the physical components of an environment on mass crime rate. In this regard, open spaces between residential complexes were selected as the case studies and based on five outdoor patterns including linear pattern, disper...
متن کاملP-87: Dietary Patterns in Relation to Ovulatory Infertility: A Case-Control Study
Background Previous studies have focused on a single or few dietary nutrients, and scarce data is available on dietary patterns related to infertility. Therefore, we aimed to investigate the relation between female ovulatory infertility and major dietary patterns among women attending fertility clinics. MaterialsAndMethods This case-control study was conducted on 167 infertile women with PCOS a...
متن کاملBuffering of Intermediate Results in Dataflow Diagrams
Buffering of intermediate results in dataflow diagrams can significantly reduce latency when a user browses these results or re-executes a diagram with slightly different inputs. We define the optimal buffer allocation problem of determining the buffer contents which minimize the average response time to such user requests. We show that this problem has several characteristics which render trad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008