[go: up one dir, main page]

Kim et al., 2006 - Google Patents

Describing access control models as design patterns using roles

Kim et al., 2006

View PDF
Document ID
5129040436417816022
Author
Kim D
Mehta P
Gokhale P
Publication year
Publication venue
Proceedings of the 2006 conference on Pattern languages of programs

External Links

Snippet

An access control model describes at a high level of abstraction a mechanism for governing access to shared resources. In this paper, we view an access control model as a design pattern providing a general solution for ensuring confidentiality, integrity and availability of …
Continue reading at hillside.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme

Similar Documents

Publication Publication Date Title
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
Hu et al. Assessment of access control systems
Ferraiolo et al. Extensible access control markup language (XACML) and next generation access control (NGAC)
KR100877650B1 (en) Implementation and method and system of PI data access control function using personally identifiable information label and purpose serving function set
Fernandez et al. A pattern language for security models
US9032076B2 (en) Role-based access control system, method and computer program product
Gladney Access control for large collections
Tari et al. A role-based access control for intranet security
Ferraiolo et al. A role-based access control model and reference implementation within a corporate intranet
Younis et al. An access control model for cloud computing
US6389540B1 (en) Stack based access control using code and executor identifiers
EP2502144B1 (en) Controlling resource access based on resource properties
Bertino Data security
Thomsen et al. Role based access control framework for network enterprises
Ausanka-Crues Methods for access control: advances and limitations
Fadhel et al. A comprehensive modeling framework for role-based access control policies
WO2009006346A2 (en) System and method for resolving permission for role activation operators
De Capitani di Vimercati et al. Authorization and access control
Kim et al. Describing access control models as design patterns using roles
Thomsen et al. Napoleon: network application policy environment
Karjoth An operational semantics of Java 2 access control
Ye et al. Improving web service security and privacy
Radhika et al. Samyukta: A unified access control model using roles, labels, and attributes
Kim et al. Describing access control patterns using roles
Tall et al. Access Control in the Era of Big-Data Driven Models and Simulations