Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems

被引:0
|
作者
Poniszewska-Maranda, Aneta [1 ]
机构
[1] Lodz Univ Technol, Inst Informat Technol, Lodz, Poland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rapid development of new technologies brings with it a need for the new security solutions. Identifying, defining and implementing of security constraints is an important part of the process of modeling and developing of application/information systems and its administration. The paper presents the issue of security constraints of information system from the point of view of Usage Role-based Access Control approach - it deals with the classification of constraints and their implementation in the process of modeling the access rules for dynamic information systems.
引用
收藏
页码:466 / 477
页数:12
相关论文
共 50 条
  • [21] Information security control as a task of control a dynamic system
    Masaev, S. N.
    Minkin, A. N.
    Bezborodov, Yu N.
    Edimichev, D. A.
    Salal, Y. K.
    [J]. II INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING 25, PTS 1-5, 2020, 1679
  • [22] Design of self dynamic and static access control ATRGBAC model for Information systems
    Le, Zhongjian
    Chen, Yanping
    [J]. SIXTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 1417 - 1422
  • [23] Information Flow for Security in Control Systems
    Weerakkody, Sean
    Sinopoli, Bruno
    Kar, Soummya
    Datta, Anupam
    [J]. 2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 5065 - 5072
  • [24] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
  • [25] Security patterns for physical access control systems
    Fernandez, Eduardo B.
    Ballesteros, Jose
    Desouza-Doucet, Ana C.
    Larrondo-Petrie, Maria M.
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 259 - +
  • [26] Security and access control requirements for computerized systems
    McDowall, R. D.
    [J]. LC GC EUROPE, 2007, 20 (11) : 583 - 585
  • [27] Access Control of Federated Information Systems
    Poniszewska-Maranda, Aneta
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 119 - 130
  • [28] Information systems security resilience as a dynamic capability
    Goel, Lakshmi
    Russell, Dawn
    Williamson, Steven
    Zhang, Justin Zuopeng
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2023, 36 (04) : 906 - 924
  • [29] Comparison and Evaluation of Information Security Models for Access Control
    Anton, Nicolae
    Nedelcu, Anisor
    [J]. ENGINEERING SOLUTIONS AND TECHNOLOGIES IN MANUFACTURING, 2014, 657 : 708 - 712
  • [30] A new grid security framework with dynamic access control
    Xie, B
    Gui, XL
    Li, YN
    Qian, DP
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 863 - 866