Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Protection in operating systems
Communications of the ACM
Composition patterns: an approach to designing reusable aspects
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Pattern-Based Technique for Developing UML Models of Access Control Systems
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 01
Describing access control models as design patterns using roles
Proceedings of the 2006 conference on Pattern languages of programs
Hi-index | 0.00 |
This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the military domain, and discuss about an analysis of the resulting model for pattern conformance.