Kim et al., 2006 - Google Patents
Describing access control patterns using rolesKim et al., 2006
View PDF- Document ID
- 10395623143355928160
- Author
- Kim D
- Mehta P
- Gokhal P
- Publication year
- Publication venue
- Proceedings of the Pattern Languages of Programming Conference (PLoP), Portland, OR
External Links
Snippet
Access control patterns describe access control mechanisms at a high level of abstraction. An access control pattern provides a general solution to a class of access control problems for the confidentiality, integrity and availability of the information resources of software …
- 230000007246 mechanism 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/52—Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Fernandez et al. | A pattern language for security models | |
Hu et al. | Assessment of access control systems | |
US9411977B2 (en) | System and method for enforcing role membership removal requirements | |
Ferraiolo et al. | Extensible access control markup language (XACML) and next generation access control (NGAC) | |
US9032076B2 (en) | Role-based access control system, method and computer program product | |
Tari et al. | A role-based access control for intranet security | |
Bertino | Data security | |
Brewer et al. | The chinese wall security policy | |
Zhang et al. | A rule-based framework for role-based delegation and revocation | |
EP2502144B1 (en) | Controlling resource access based on resource properties | |
KR101101085B1 (en) | Zone-based security management of data items | |
US8181243B2 (en) | Computer readable medium for resolving permission for role activation operators | |
Moffett | Specification of management policies and discretionary access control | |
Beznosov et al. | A framework for implementing role-based access control using CORBA security service | |
De Capitani di Vimercati et al. | Authorization and access control | |
Howell | Naming and sharing resources across administrative boundaries | |
Karjoth | An operational semantics of Java 2 access control | |
Kim et al. | Describing access control models as design patterns using roles | |
Kim et al. | Describing access control patterns using roles | |
Galiasso et al. | Policy mediation for multi-enterprise environments | |
Coulouris et al. | A security model for cooperative work | |
Joshi | A generalized temporal role based access control model for developing secure systems | |
Karjoth | Authorization in CORBA security | |
Chinaei et al. | User-managed access control for health care systems |