Proceedings of the 2006 Conference on Pattern Languages of Programs 2006
DOI: 10.1145/1415472.1415485
|View full text |Cite
|
Sign up to set email alerts
|

Describing access control models as design patterns using roles

Abstract: An access control model describes at a high level of abstraction a mechanism for governing access to shared resources. In this paper, we view an access control model as a design pattern providing a general solution for ensuring confidentiality, integrity and availability of information resources. We present three widely used access control models, DAC, MAC and RBAC as design patterns using the POSA template. We use an extension of the UML to represent the structure and behavior of the patterns. The extension e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…After transformation, the technique can be also used to check correct incorporation of the pattern properties by evaluating conformance of the transformed model to the solution specification of the pattern. We have also used the proposed approach for patterns (e.g., DAC, MAC, RBAC) (Kim et al 2006) in the security domain to check access control properties in security systems.…”
Section: Resultsmentioning
confidence: 99%
“…After transformation, the technique can be also used to check correct incorporation of the pattern properties by evaluating conformance of the transformed model to the solution specification of the pattern. We have also used the proposed approach for patterns (e.g., DAC, MAC, RBAC) (Kim et al 2006) in the security domain to check access control properties in security systems.…”
Section: Resultsmentioning
confidence: 99%
“…We interviewed each expert with an existing hierarchy already created from patterns gathered from textbooks and our pattern repository [9,12,36,37,38]. Our goal was to further expand and refine our hierarchy as well as to find a unique subset of the patterns in the hierarchy that would apply to each scenario based on expert opinion.…”
Section: Expert Interviewsmentioning
confidence: 99%
“…For instance, the S-TTP determines an Access Level (AL) for the EHRs based on three factors: the identification of an Authorised Device and Authorised Person who wants to have access to a patient's medical information, the patient's consent, and the relevant healthcare legislation. Based on these factors the S-TTP maintains three access control lists: Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC) [8,9]. The MAC and DAC list are made by using the patient's consent.…”
Section: Proposed National Communication Frameworkmentioning
confidence: 99%