語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A connector-centric approach to arch...
~
Ren, Jie.
FindBook
Google Book
Amazon
博客來
A connector-centric approach to architectural access control.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
A connector-centric approach to architectural access control./
作者:
Ren, Jie.
面頁冊數:
206 p.
附註:
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
Contained By:
Dissertation Abstracts International67-03B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3209313
ISBN:
9780542578540
A connector-centric approach to architectural access control.
Ren, Jie.
A connector-centric approach to architectural access control.
- 206 p.
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
Thesis (Ph.D.)--University of California, Irvine, 2006.
An important problem is the architectural access control question: how can we describe and check access control issues at the software architecture level? We propose a connector-centric approach for software architectural access control. Our approach is based on a unified access control model incorporating the classic model, the role-based model, and the trust management model.
ISBN: 9780542578540Subjects--Topical Terms:
626642
Computer Science.
A connector-centric approach to architectural access control.
LDR
:03472nmm 2200337 4500
001
1822598
005
20061129144541.5
008
130610s2006 eng d
020
$a
9780542578540
035
$a
(UnM)AAI3209313
035
$a
AAI3209313
040
$a
UnM
$c
UnM
100
1
$a
Ren, Jie.
$3
1911737
245
1 2
$a
A connector-centric approach to architectural access control.
300
$a
206 p.
500
$a
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
500
$a
Adviser: Richard N. Taylor.
502
$a
Thesis (Ph.D.)--University of California, Irvine, 2006.
520
$a
An important problem is the architectural access control question: how can we describe and check access control issues at the software architecture level? We propose a connector-centric approach for software architectural access control. Our approach is based on a unified access control model incorporating the classic model, the role-based model, and the trust management model.
520
$a
We design a secure software architecture description language, Secure xADL, that extends the xADL language with constructs necessary to describe access control issues. Secure xADL extends descriptions of components, connectors, their types, sub-architectures, and the global architecture with subject, principal, permission, resource, privilege, safeguard, and policy. We use the XACML language as the basis for architectural security policy modeling. Four types of contexts for architectural access control are also identified: (1) the nearby constituents of components and connectors, (2) the types of components and connectors, (3) the containing sub-architecture, and (4) the global architecture.
520
$a
We present an algorithm to check architectural access control: given a secure software architecture description written in Secure xADL, if a component A wants to access another component B, should the access be allowed?
520
$a
Tool support is provided as part of the ArchStudio architecture development environment, including an editor, a checker, the secure architecture controller, and a run-time framework enabling important architectural operations: instantiating components and connectors, connecting components to connectors, and message routing.
520
$a
Connectors play a central role in our approach. They can propagate privileges within the architecture, decide whether architectural connections can be made, and route messages according to their security policies.
520
$a
Our hypotheses are: an architectural connector may serve as a suitable construct to model architectural access control; the connector-centric approach can be applied to different types of componentized and networked software systems; the access control check algorithm can check the suitability of accessing interfaces; in an architecture style based on event routing connectors, our approach can route events in accordance with the secure delivery requirements.
520
$a
To validate these hypotheses, we have performed an informal analysis of the algorithm, developed two applications, Secure Coalition and Impromptu, and modeled the security architecture of Firefox and DCOM.
590
$a
School code: 0030.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of California, Irvine.
$3
705821
773
0
$t
Dissertation Abstracts International
$g
67-03B.
790
1 0
$a
Taylor, Richard N.,
$e
advisor
790
$a
0030
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3209313
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9213461
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入