Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems

被引:0
|
作者
Poniszewska-Maranda, Aneta [1 ]
机构
[1] Lodz Univ Technol, Inst Informat Technol, Lodz, Poland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rapid development of new technologies brings with it a need for the new security solutions. Identifying, defining and implementing of security constraints is an important part of the process of modeling and developing of application/information systems and its administration. The paper presents the issue of security constraints of information system from the point of view of Usage Role-based Access Control approach - it deals with the classification of constraints and their implementation in the process of modeling the access rules for dynamic information systems.
引用
收藏
页码:466 / 477
页数:12
相关论文
共 50 条
  • [1] Access control coherence of information systems based on security constraints
    Poniszewska-Maranda, Aneta
    [J]. COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
  • [2] Modeling and design of role engineering in development of access control for dynamic information systems
    Poniszewska-Maranda, A.
    [J]. BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2013, 61 (03) : 569 - 579
  • [3] Security constraints in access control of information system using UML language
    Poniszewska-Maranda, Aneta
    [J]. 15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 332 - +
  • [4] Resilience to Leaking - Dynamic Systems Modeling of Information Security
    Hamacher, Kay
    [J]. PLOS ONE, 2012, 7 (12):
  • [5] Towards Dynamic Access Control for Healthcare Information Systems
    Rostad, Lillian
    Nytro, Oystein
    [J]. EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 703 - 708
  • [6] Dynamic Authentication with Sensory Information for the Access Control Systems
    Shu, Yuanchao
    Gu, Yu
    Chen, Jiming
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 427 - 436
  • [7] Dynamic Security Rules for Legacy Systems
    Al-Ali, Rima
    Hnetynka, Petr
    Havlik, Jiri
    Krivka, Vlastimil
    Heinrich, Robert
    Seifermann, Stephan
    Walter, Maximilian
    Juan-Verdejo, Adrian
    [J]. 13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 277 - 284
  • [8] Dynamic Output Feedback Control of Networked Systems With Medium Access Constraints
    Zhu, Chaoqun
    Zhang, Pan
    Li, Liuyang
    Yang, Bin
    Lu, Zibao
    [J]. IEEE ACCESS, 2021, 9 : 123075 - 123087
  • [9] Information Flow-Based Security Levels Assessment for Access Control Systems
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    [J]. E-TECHNOLOGIES, MCETECH 2015, 2015, 209 : 105 - 121
  • [10] Architecture of the Security Access System for Information on the State of the Automatic Control Systems of Aircraft
    Frid, Arkady Isaakovich
    Vulfin, Alexey Mikhailovich
    Berholz, Victoria Viktorovna
    Zakharov, Dmitry Yurievich
    Mironov, Konstantin Valerievich
    [J]. ACTA POLYTECHNICA HUNGARICA, 2020, 17 (08) : 151 - 164