Kim et al., 2006 - Google Patents
Describing access control models as design patterns using rolesKim et al., 2006
View PDF- Document ID
- 5129040436417816022
- Author
- Kim D
- Mehta P
- Gokhale P
- Publication year
- Publication venue
- Proceedings of the 2006 conference on Pattern languages of programs
External Links
Snippet
An access control model describes at a high level of abstraction a mechanism for governing access to shared resources. In this paper, we view an access control model as a design pattern providing a general solution for ensuring confidentiality, integrity and availability of …
- 229920005994 diacetyl cellulose 0 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Hu et al. | Assessment of access control systems | |
Ferraiolo et al. | Extensible access control markup language (XACML) and next generation access control (NGAC) | |
KR100877650B1 (en) | Implementation and method and system of PI data access control function using personally identifiable information label and purpose serving function set | |
Fernandez et al. | A pattern language for security models | |
US9032076B2 (en) | Role-based access control system, method and computer program product | |
Gladney | Access control for large collections | |
Tari et al. | A role-based access control for intranet security | |
Ferraiolo et al. | A role-based access control model and reference implementation within a corporate intranet | |
Younis et al. | An access control model for cloud computing | |
US6389540B1 (en) | Stack based access control using code and executor identifiers | |
EP2502144B1 (en) | Controlling resource access based on resource properties | |
Bertino | Data security | |
Thomsen et al. | Role based access control framework for network enterprises | |
Ausanka-Crues | Methods for access control: advances and limitations | |
Fadhel et al. | A comprehensive modeling framework for role-based access control policies | |
WO2009006346A2 (en) | System and method for resolving permission for role activation operators | |
De Capitani di Vimercati et al. | Authorization and access control | |
Kim et al. | Describing access control models as design patterns using roles | |
Thomsen et al. | Napoleon: network application policy environment | |
Karjoth | An operational semantics of Java 2 access control | |
Ye et al. | Improving web service security and privacy | |
Radhika et al. | Samyukta: A unified access control model using roles, labels, and attributes | |
Kim et al. | Describing access control patterns using roles | |
Tall et al. | Access Control in the Era of Big-Data Driven Models and Simulations |