메뉴 건너뛰기




Volumn 29, Issue 3, 2010, Pages 350-379

A framework of composable access control features: Preserving separation of access control concerns from models to code

Author keywords

Access controls; Model driven development; Separation of concerns; Software engineering; UML

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; DISCRETIONARY ACCESS CONTROL; INTEGRAL PART; MANDATORY ACCESS CONTROL; MODEL DRIVEN DEVELOPMENT; ROLE-BASED ACCESS CONTROL; SECURITY POLICY; SEPARATION OF CONCERNS; SMALL COMPONENTS; SOFTWARE APPLICATIONS; SOFTWARE DEVELOPMENT PROCESS; STRUCTURE-PRESERVING;

EID: 77949562741     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.11.005     Document Type: Article
Times cited : (24)

References (64)
  • 1
    • 33751113935 scopus 로고    scopus 로고
    • Validating the enforcement of access control policies and separation of duty principle in requirement engineering
    • Alghathbar K. Validating the enforcement of access control policies and separation of duty principle in requirement engineering. Information and Software Technology 49 2 (2007) 142-157
    • (2007) Information and Software Technology , vol.49 , Issue.2 , pp. 142-157
    • Alghathbar, K.1
  • 11
    • 0033203848 scopus 로고    scopus 로고
    • Subject-oriented design: Towards improved alignment of requirements, design, and code
    • Clarke S, Harrison W, Ossher H, Tarr P. Subject-oriented design: towards improved alignment of requirements, design, and code. In: Proceedings of OOPSLA 1999, 1999.
    • (1999) Proceedings of OOPSLA
    • Clarke, S.1    Harrison, W.2    Ossher, H.3    Tarr, P.4
  • 12
    • 77949547568 scopus 로고    scopus 로고
    • Analyzing security advice in functional aspect-oriented programming languages. PhD thesis, Princeton, NJ, USA
    • Daniel S. Dantas. Analyzing security advice in functional aspect-oriented programming languages. PhD thesis, Princeton, NJ, USA, 2007.
    • (2007)
    • Dantas, D.S.1
  • 14
    • 77949557782 scopus 로고    scopus 로고
    • De-Win B. Engineering application-level security through aspect-oriented software development. PhD thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium; 2004.
    • De-Win B. Engineering application-level security through aspect-oriented software development. PhD thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium; 2004.
  • 16
    • 77949551433 scopus 로고    scopus 로고
    • DoD. Trusted computer system evaluation criteria. 5200.28-STD. DoD; 1985.
    • DoD. Trusted computer system evaluation criteria. 5200.28-STD. DoD; 1985.
  • 17
    • 77949554779 scopus 로고    scopus 로고
    • Ellis HJ, Phillips C, Liebrand M, Ting TC. Role delegation for a distributed, unified RBAC/MAC. In: Proceedings of sixteenth annual IFIP WG 11.3 working conference on data and application security; 2002.
    • Ellis HJ, Phillips C, Liebrand M, Ting TC. Role delegation for a distributed, unified RBAC/MAC. In: Proceedings of sixteenth annual IFIP WG 11.3 working conference on data and application security; 2002.
  • 20
    • 84940110094 scopus 로고    scopus 로고
    • Evans David, Twyman Andrew. Flexible policy-directed code safety. In: Security and Privacy, IEEE Symposium on, 0; 1999, p. 0032.
    • Evans David, Twyman Andrew. Flexible policy-directed code safety. In: Security and Privacy, IEEE Symposium on, vol. 0; 1999, p. 0032.
  • 28
    • 77949542751 scopus 로고    scopus 로고
    • Huang M, Wang C, Zhang L. Toward a reusable and generic security aspect library. In: AOSD: AOSDSEC, 4; 2004.
    • Huang M, Wang C, Zhang L. Toward a reusable and generic security aspect library. In: AOSD: AOSDSEC, vol. 4; 2004.
  • 30
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport L. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering 3 2 (1977) 125-143
    • (1977) IEEE Transactions on Software Engineering , vol.3 , Issue.2 , pp. 125-143
    • Lamport, L.1
  • 38
    • 77949551568 scopus 로고    scopus 로고
    • OMG. UML 2.0 Object Constraint Language (OCL) Specification, 2003.
    • OMG. UML 2.0 Object Constraint Language (OCL) Specification, 2003.
  • 40
    • 0015482049 scopus 로고
    • On the criteria to be used in decomposing systems into modules
    • Parnas D. On the criteria to be used in decomposing systems into modules. Communications ACM 15 (1972) 1053-1058
    • (1972) Communications ACM , vol.15 , pp. 1053-1058
    • Parnas, D.1
  • 41
    • 26444453610 scopus 로고    scopus 로고
    • Pavlich-Mariscal J, Doan T, Michel L, Demurjian S, Ting TC. Role-slices: a notation for RBAC permission assignment and enforcement. In: Proceedings of 19th annual IFIP WG 11.3 working conference on data and applications security, 3654 of Lecture notes in computer science; 2005a, pp 40-53.
    • Pavlich-Mariscal J, Doan T, Michel L, Demurjian S, Ting TC. Role-slices: a notation for RBAC permission assignment and enforcement. In: Proceedings of 19th annual IFIP WG 11.3 working conference on data and applications security, vol. 3654 of Lecture notes in computer science; 2005a, pp 40-53.
  • 42
    • 33646186281 scopus 로고    scopus 로고
    • A formal enforcement framework for role-based access control using aspect-oriented programming
    • ACM/IEEE 8th international conference on model driven engineering languages and systems, of
    • Pavlich-Mariscal J, Michel L, Demurjian S. A formal enforcement framework for role-based access control using aspect-oriented programming. In: ACM/IEEE 8th international conference on model driven engineering languages and systems, vol. 3713 of Lecture Notes in computer science; 2005b, pp. 537-552.
    • (2005) Lecture Notes in computer science , vol.3713 , pp. 537-552
    • Pavlich-Mariscal, J.1    Michel, L.2    Demurjian, S.3
  • 46
    • 77949549866 scopus 로고    scopus 로고
    • Ray I, Li N, Kim D, France R. Using parameterized UML to specify and compose access control models. In: Proceedings of the 6th IFIP TC-11 WG 11.5 working conference on integrity and internal control in information systems; 2003.
    • Ray I, Li N, Kim D, France R. Using parameterized UML to specify and compose access control models. In: Proceedings of the 6th IFIP TC-11 WG 11.5 working conference on integrity and internal control in information systems; 2003.
  • 47
    • 84944683046 scopus 로고    scopus 로고
    • Security-critical system development with extended use cases
    • IEEE Computer Society, Los Alamitos, CA, USA
    • Popp G., Jurjens J., Wimmel G., and Breu R. Security-critical system development with extended use cases. Asia-Pacific Software Engineering Conference vol 0 (2003), IEEE Computer Society, Los Alamitos, CA, USA 478
    • (2003) Asia-Pacific Software Engineering Conference , pp. 478
    • Popp, G.1    Jurjens, J.2    Wimmel, G.3    Breu, R.4
  • 50
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu R.S. Lattice-based access control models. IEEE Computer 26 11 (1993) 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 58
    • 1842458587 scopus 로고
    • The impact of inheritance on security in object-oriented database systems
    • Spooner D. The impact of inheritance on security in object-oriented database systems. In: Database security II: status and prospects; 1989.
    • (1989) Database security II: Status and prospects
    • Spooner, D.1
  • 62
    • 0242613528 scopus 로고
    • Application information security semantics: A case of mental health delivery
    • Ting TC. Application information security semantics: a case of mental health delivery. In: Database security III: status and prospects; 1990.
    • (1990) Database security III: Status and prospects
    • Ting, T.C.1
  • 64
    • 34548737170 scopus 로고    scopus 로고
    • A static verification framework for secure Peer-to-Peer applications
    • IEEE Computer Society, Los Alamitos, CA, USA
    • Zisman A. A static verification framework for secure Peer-to-Peer applications. Internet and web applications and services, international conference on vol. 0 (2007), IEEE Computer Society, Los Alamitos, CA, USA 8
    • (2007) Internet and web applications and services, international conference on , pp. 8
    • Zisman, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.