Exploiting modular access control for advanced policies
Abstract
References
Index Terms
- Exploiting modular access control for advanced policies
Recommendations
Secure and modular access control with aspects
AOSD '13: Proceedings of the 12th annual international conference on Aspect-oriented software developmentCan access control be fully modularized as an aspect? Most proposals for aspect-oriented access control are limited to factoring out access control checks, still relying on a non-modular and ad hoc infrastructure for permission checking. Recently, we ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Aspectizing Java Access Control
It is inevitable that some concerns crosscut a sizeable application, resulting in code scattering and tangling. This issue is particularly severe for security-related concerns: It is difficult to be confident about the security of an application when ...
Comments
Information & Contributors
Information
Published In

Sponsors
In-Cooperation
- Centro de Informatica - UFPE: Centro de Informatica - UFPE
- CAPES: Coordençãao de Aperfeiçoamento de Pessoal de Nível Superior
- CNPq: Conselho Nacional de Desenvolvimento Cientifico e Tecn
- FINEP: Financiadora de Estudos e Projetos
- PUC-Rio
- FACEPE: Fundacao de Amparo a Ciencia e Tecnologia do Estado de Pernambuco
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 80Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in