Patterns for access control in distributed systems

  • Authors:
  • Nelly Delessy;Eduardo B. Fernandez;M. M. Larrondo-Petrie;Jie Wu

  • Affiliations:
  • Florida Atlantic University, Boca Raton, Florida;Florida Atlantic University, Boca Raton, Florida;Florida Atlantic University, Boca Raton, Florida;Florida Atlantic University, Boca Raton, Florida

  • Venue:
  • Proceedings of the 14th Conference on Pattern Languages of Programs
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Distributed systems introduce a new variety of security threats. The organizations that own those systems must protect their information assets from attacks. To do this we need to start with high-level models that represent the security policies of the institution. We present patterns that derive from traditional models: first, the Policy-Based Access Control which models how to decide if a subject is authorized to access an object according to policies defined in a central policy repository. Then we present implementation-oriented patterns that implement the Access Matrix or RBAC model: The ACL pattern allows control access to objects by indicating which subjects can access an object and in what way. There is usually an ACL associated with each object. The Capability pattern allows control access to objects by providing a credential or ticket to be given to a subject for accessing an object in a specific way. Capabilities are given to the principal.