Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Role-based access control in ORACLE7 and Trusted ORACLE7
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Protection in operating systems
Communications of the ACM
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects
Abstract session: an object structural pattern
Design patterns in communications software
Improving the granularity of access control for Windows 2000
ACM Transactions on Information and System Security (TISSEC)
Role-Based Access Control
A Role-Based Metamodeling Approach to Specifying Design Patterns
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
A UML-Based Pattern Specification Technique
IEEE Transactions on Software Engineering
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
A meta-modeling approach to specifying patterns
A meta-modeling approach to specifying patterns
A Pattern-Based Technique for Developing UML Models of Access Control Systems
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 01
Evaluating pattern conformance of UML models: a divide-and-conquer approach and case studies
Software Quality Control
Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems
ICSR '08 Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems
Quality-driven architecture development using architectural tactics
Journal of Systems and Software
IBM Journal of Research and Development
Hi-index | 0.00 |
An access control model describes at a high level of abstraction a mechanism for governing access to shared resources. In this paper, we view an access control model as a design pattern providing a general solution for ensuring confidentiality, integrity and availability of information resources. We present three widely used access control models, DAC, MAC and RBAC as design patterns using the POSA template. We use an extension of the UML to represent the structure and behavior of the patterns. The extension enables capturing variations of pattern instances. We also attempt to give more details on the problem domain of the patterns to help pattern selection.