IFIP International Federation for Information Processing
DOI: 10.1007/1-4020-8128-6_16
|View full text |Cite
|
Sign up to set email alerts
|

A Pattern System for Access Control

Abstract: Abstract:In order to develop trustworthy information systems, security aspects should be considered from the early project stages. This is particularly true for authorization and access control services, which decide which users can access which parts of the system and in what ways. Software patterns have been used with success to encapsulate best practices in software design. A good collection of patterns is an invaluable aid in designing new systems by inexperienced developers and is also useful to teach and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0
1

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 64 publications
(36 citation statements)
references
References 10 publications
0
35
0
1
Order By: Relevance
“…However, the approach by [6] uses ABAC. As has been proven by [14] ABAC is able to subsume other access control models such as DAC, MAC, or RBAC. An adaptation of the original pattern has already been advised in the work of [13].…”
Section: Saml Assertion Block -Iimentioning
confidence: 95%
“…However, the approach by [6] uses ABAC. As has been proven by [14] ABAC is able to subsume other access control models such as DAC, MAC, or RBAC. An adaptation of the original pattern has already been advised in the work of [13].…”
Section: Saml Assertion Block -Iimentioning
confidence: 95%
“…A variety of security patterns have been proposed in the past. Among these, patterns for implementing access control [Fernandez and Pan 2001;Priebe et al 2004] can be used at the trusted kernel boundary to manage how resources are accessed.…”
Section: Related Patternsmentioning
confidence: 99%
“…The relationships appear as labeled arrows. In this diagram, traditional models, such as the Access Matrix and RBAC (Role-Based Access Control), are represented along with Attribute-Based Access control [Pri04] and Policy-Based Access control. The two latter models are more suitable in the case of distributed systems.…”
Section: Introductionmentioning
confidence: 99%