Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A connector-centric approach to arch...
~
Ren, Jie.
Linked to FindBook
Google Book
Amazon
博客來
A connector-centric approach to architectural access control.
Record Type:
Electronic resources : Monograph/item
Title/Author:
A connector-centric approach to architectural access control./
Author:
Ren, Jie.
Description:
206 p.
Notes:
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
Contained By:
Dissertation Abstracts International67-03B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3209313
ISBN:
9780542578540
A connector-centric approach to architectural access control.
Ren, Jie.
A connector-centric approach to architectural access control.
- 206 p.
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
Thesis (Ph.D.)--University of California, Irvine, 2006.
An important problem is the architectural access control question: how can we describe and check access control issues at the software architecture level? We propose a connector-centric approach for software architectural access control. Our approach is based on a unified access control model incorporating the classic model, the role-based model, and the trust management model.
ISBN: 9780542578540Subjects--Topical Terms:
626642
Computer Science.
A connector-centric approach to architectural access control.
LDR
:03472nmm 2200337 4500
001
1822598
005
20061129144541.5
008
130610s2006 eng d
020
$a
9780542578540
035
$a
(UnM)AAI3209313
035
$a
AAI3209313
040
$a
UnM
$c
UnM
100
1
$a
Ren, Jie.
$3
1911737
245
1 2
$a
A connector-centric approach to architectural access control.
300
$a
206 p.
500
$a
Source: Dissertation Abstracts International, Volume: 67-03, Section: B, page: 1529.
500
$a
Adviser: Richard N. Taylor.
502
$a
Thesis (Ph.D.)--University of California, Irvine, 2006.
520
$a
An important problem is the architectural access control question: how can we describe and check access control issues at the software architecture level? We propose a connector-centric approach for software architectural access control. Our approach is based on a unified access control model incorporating the classic model, the role-based model, and the trust management model.
520
$a
We design a secure software architecture description language, Secure xADL, that extends the xADL language with constructs necessary to describe access control issues. Secure xADL extends descriptions of components, connectors, their types, sub-architectures, and the global architecture with subject, principal, permission, resource, privilege, safeguard, and policy. We use the XACML language as the basis for architectural security policy modeling. Four types of contexts for architectural access control are also identified: (1) the nearby constituents of components and connectors, (2) the types of components and connectors, (3) the containing sub-architecture, and (4) the global architecture.
520
$a
We present an algorithm to check architectural access control: given a secure software architecture description written in Secure xADL, if a component A wants to access another component B, should the access be allowed?
520
$a
Tool support is provided as part of the ArchStudio architecture development environment, including an editor, a checker, the secure architecture controller, and a run-time framework enabling important architectural operations: instantiating components and connectors, connecting components to connectors, and message routing.
520
$a
Connectors play a central role in our approach. They can propagate privileges within the architecture, decide whether architectural connections can be made, and route messages according to their security policies.
520
$a
Our hypotheses are: an architectural connector may serve as a suitable construct to model architectural access control; the connector-centric approach can be applied to different types of componentized and networked software systems; the access control check algorithm can check the suitability of accessing interfaces; in an architecture style based on event routing connectors, our approach can route events in accordance with the secure delivery requirements.
520
$a
To validate these hypotheses, we have performed an informal analysis of the algorithm, developed two applications, Secure Coalition and Impromptu, and modeled the security architecture of Firefox and DCOM.
590
$a
School code: 0030.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of California, Irvine.
$3
705821
773
0
$t
Dissertation Abstracts International
$g
67-03B.
790
1 0
$a
Taylor, Richard N.,
$e
advisor
790
$a
0030
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3209313
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9213461
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login