Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems

  • Authors:
  • Dae-Kyoo Kim;Lunjin Lu

  • Affiliations:
  • Department of Computer Science and Engineering, Oakland University, Rochester, USA MI 48309;Department of Computer Science and Engineering, Oakland University, Rochester, USA MI 48309

  • Venue:
  • ICSR '08 Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the military domain, and discuss about an analysis of the resulting model for pattern conformance.