Title | ||
---|---|---|
A framework of composable access control features: Preserving separation of access control concerns from models to code |
Abstract | ||
---|---|---|
Modeling of security policies, along with their realization in code, must be an integral part of the software development process, to achieve an acceptable level of security for a software application. Among all of the security concerns (e.g. authentication, auditing, access control, confidentiality, etc.), this paper addresses the incorporation of access control into software. The approach is to separate access control concerns from the rest of the design. To assist designers to visualize access control policies separated from non-security concerns, this paper proposes a set of access control diagrams, i.e., extensions to the UML to represent three main access control models: role-based access control (RBAC), mandatory access control (MAC), and discretionary access control (DAC). To better adapt to changing requirements, and assist designers to customize access control policies, this paper proposes a set of access control features, i.e., small components that realize specific capabilities of access control models. Designers can select the features they require, and compose them to yield different access control policies. When transitioning into code, the main focus is to preserve separation of access control concerns. This paper describes an approach to realize access control diagrams and features in code through structure-preserving mappings, describes three different approaches to enforce access control in code, and evaluates the way each of them separate access control from other concerns. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1016/j.cose.2009.11.005 | Computers & Security |
Keywords | Field | DocType |
model-driven development,access controls,uml,separation of concerns,software engineering,security policy,software development process,role based access control,separation of concern,access control,discretionary access control | Computer access control,Internet privacy,Computer science,Computer security,Separation of concerns,Role-based access control,Mandatory access control,Discretionary access control,Access control,Network Access Control,Physical access | Journal |
Volume | Issue | ISSN |
29 | 3 | Computers & Security |
Citations | PageRank | References |
15 | 0.65 | 26 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jaime A. Pavlich-Mariscal | 1 | 43 | 8.72 |
Steven A. Demurjian | 2 | 314 | 136.36 |
Laurent D. Michel | 3 | 64 | 8.53 |