Title | ||
---|---|---|
Pattern-Based Transformation Rules for Developing Interaction Models of Access Control Systems |
Abstract | ||
---|---|---|
This paper presents a set of transformation rules for transforming a non-secure interaction model to a secure interaction model using an access control pattern. The transformation rules resolve conflicts, uncertainties and type mismatches that may arise during pattern application. We demonstrate a case study using the Mandatory Access Control pattern and a defense messaging system in the military domain, and discuss about an analysis of the resulting model for pattern conformance. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-68073-4_33 | ICSR |
Keywords | Field | DocType |
access control systems,transformation rule,mandatory access control pattern,pattern application,military domain,non-secure interaction model,pattern-based transformation rules,case study,interaction models,access control pattern,secure interaction model,pattern conformance,resulting model,access control | Sequence diagram,Security level,Computer science,Interaction model,Mandatory access control,Specification pattern,Access control,Distributed computing,Design pattern | Conference |
Volume | ISSN | Citations |
5030 | 0302-9743 | 2 |
PageRank | References | Authors |
0.39 | 5 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dae-Kyoo Kim | 1 | 596 | 49.69 |
Lunjin Lu | 2 | 229 | 26.40 |