[go: up one dir, main page]

Kim et al., 2006 - Google Patents

Describing access control patterns using roles

Kim et al., 2006

View PDF
Document ID
10395623143355928160
Author
Kim D
Mehta P
Gokhal P
Publication year
Publication venue
Proceedings of the Pattern Languages of Programming Conference (PLoP), Portland, OR

External Links

Snippet

Access control patterns describe access control mechanisms at a high level of abstraction. An access control pattern provides a general solution to a class of access control problems for the confidentiality, integrity and availability of the information resources of software …
Continue reading at hillside.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/4421Execution paradigms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management

Similar Documents

Publication Publication Date Title
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
Fernandez et al. A pattern language for security models
Hu et al. Assessment of access control systems
US9411977B2 (en) System and method for enforcing role membership removal requirements
Ferraiolo et al. Extensible access control markup language (XACML) and next generation access control (NGAC)
US9032076B2 (en) Role-based access control system, method and computer program product
Tari et al. A role-based access control for intranet security
Bertino Data security
Brewer et al. The chinese wall security policy
Zhang et al. A rule-based framework for role-based delegation and revocation
EP2502144B1 (en) Controlling resource access based on resource properties
KR101101085B1 (en) Zone-based security management of data items
US8181243B2 (en) Computer readable medium for resolving permission for role activation operators
Moffett Specification of management policies and discretionary access control
Beznosov et al. A framework for implementing role-based access control using CORBA security service
De Capitani di Vimercati et al. Authorization and access control
Howell Naming and sharing resources across administrative boundaries
Karjoth An operational semantics of Java 2 access control
Kim et al. Describing access control models as design patterns using roles
Kim et al. Describing access control patterns using roles
Galiasso et al. Policy mediation for multi-enterprise environments
Coulouris et al. A security model for cooperative work
Joshi A generalized temporal role based access control model for developing secure systems
Karjoth Authorization in CORBA security
Chinaei et al. User-managed access control for health care systems