Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions

Size: px
Start display at page:

Download "Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions"

Transcription

1 Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische Universitaet Muenchen {lehmannk, Abstract Business applications have to deal with two types of access control models: the role-based and the discretionary access control model. The main contribution of this paper is that both data models are unified in a single description language. Starting from a meta model of an object oriented data model and a simple service model this paper shows how to describe and integrate access control needs in common business applications using an authorization model based on path expressions. These path expressions can be used to construct set-oriented queries for access control decisions derived from the data model of the application. Throughout the paper one example shows the expressive power of this authorization model.. Introduction Reliable authentication and authorization mechanisms are the two basic requirements that make up secure systems. By means of authentication the identity of the calling subject is verified. Entities whose identity can be verified are also called principals. Authorization procedures allow controlled access to restricted system resources. The calling subject must hold the permissions applicable to the request made in order to access restricted resources. This paper is about authorization. Access control systems are described by subjects, objects and actions. A permission is the ability to perform an action on an object. Some synonyms for permission are right, privilege, entitlement and authorization. Objects for which permissions are requested are called targets. In the simplest case granting permission to a subject only depends on the action, target and subject itself. More complex access control requests may need to know additional information like the state of the target object of other related objects within the system. Subjects are the active elements within a system; they are also called initiators or requestors. Objects represent the passive elements; they are resources on which protected operations the actions are invoked. Actions may have side-effects. Therefore, the invocation of access restricted operations should be considered a transaction that is either executed as a whole unit or not at all. This is to protect the integrity of the system and the resources administered herein at any time. Here, a transaction does not incorporate all ACID properties. Consistency and durability are not considered. Within business information systems, the rolebased access control (RBAC) model is most widely used. In RBAC, permissions on objects are grouped into roles. These roles are then assigned to subjects. In order to successfully execute an action on an object the requesting subject needs to have one or more roles activated that allow the execution of this action. There exists a proposed standard for this access control model []. The highest possible security of an RBACbased system is reached if the principle of least privilege is implemented. Therefore subjects should be able to surrender all but the minimal set of roles that enable the execution of the requested action(s). In some business information systems, e.g. community software, it is desirable to leave some access control decisions to the discretion of the owner of the respective resource, so that (s)he may decide which other subjects may impose which actions on the owned resources. This model is called discretionary access control (DAC) model.

2 In most business applications, both kinds of models are used in a mixed fashion. To unify administration tasks, both models have to be described in a common way. A naive way to do this is by establishing for every subject a separate role which represents the rights of ownership to owned resources. But this procedure produces a large number of roles that encapsulate only one subject, namely the owner of the resource for whom this role was created. In this paper, a different approach is taken. Access control decision functions are represented by paths in a data model. The paper is structured a follows. In the next chapter some related work is referenced. In chapter 3 the meta data model used as a basis for constructing path expressions for access control is introduced. Chapter 4 gives an example data model that is used throughout this paper. Chapter 5 introduces a simple service model that is assumed for this work. Chapter 6 is the main contribution of this paper. It explains an access control model based on path expressions. Chapter 7 gives a short example applying the access control model to the example introduced in chapter 4. The paper ends by giving a conclusion and hints on future work. 2. Related work As there exist many publications already on access control models and implementations the reference list only shows some major works that are relevant in the area of business applications. One example is the extensible Access Control Markup Language, in short: XACML, which is an OASIS standard currently in version.0 [2]. XACML is a powerful description language for expressing security policies in distributed systems by means of a standardized XML-format. XACML consists of a core specification and some profile extensions for special needs such as role-based access control or access to hierarchical resources. However, due to the hierarchical format of XML-documents, resources that may be best administered by XACML policies also have a tree like, hierarchical structure. This is e.g. the case with file systems. It is rather intricate to express access control demands for resources structured otherwise. When protecting business objects that are connected via associations with other business objects, this network model is rather awkwardly expressed in a hierarchical model most suitable for XML-oriented languages. Another example is the Java Security Architecture (JSA) [3]. JSA supplies the programmer with interfaces and classes for programming permissions and enforcing access control policies. The emphasis here lies on code access security, i.e. users may classify code into being trusted or not trusted by means of the code base, signatures of class files and the like. New to JSA is that security policies may also express access control decisions based on the principal that is running the code. Some predefined permissions accessing system resources like sockets, the file system, etc. are already being enforced by the security manager installed in the Java Runtime Environment. Enforcement of user-defined permissions has to be coded by hand. Therefore usage of JSA does not alleviate work when defining and implementing access control restrictions for arbitrary business objects. SecureUML [4] is a model driven approach to generating source code from a UML-model using special extension syntax to express role-based security demands. The role-based access control model used by SecureUML is a fixed model. For using different access control models, like DAC, a different extension syntax has to be developed. 3. The meta data model The meta model used throughout this paper (see Figure ) is similar to the object-oriented data model of the Meta Object Facility specification [5]. The objectoriented data model describes resources, namely the business objects as classes with properties and associations between them. Associations may have properties describing further qualities of the association. Common association kinds are one-tomany associations with cardinalities on the one-side and on the many-side and many-to-many associations with a cardinality of on both sides. Instances of associations that connect instances of classes are called links in this data model. Relational ER-diagrams as well as UML-class diagrams may be directly mapped to their meta model.

3 .. Role 2.. multiplicity Class Instance Weblog parent WEBLOGENTRY _WEBLOG WeblogEntry -text: String -view: int Property type.. Figure : Meta data model xor 4. Example data model author 0.. Group WEBLOG_AUTHOR reader 0.. WEBLOG_READER GROUP_MEMBER member Person owner -name:string WEBLOG_OWNER -isanonymous: boolean WEBLOGENTRY_AUTHOR entryauthor Figure 2: Example data model Association Link The following example application is used throughout this paper. The example (see figure 2) represents community software that manages weblogs. Weblogs are websites that are published by a Person and are updated frequently, e.g. daily. They consist of a list of WeblogEntries that are sorted in reversed chronological order. In the example below each weblog belongs to a designated person, the owner. Each weblog may be read by a Group of persons, the reader group, and entries may be written by an author group. The person creating an entry has special rights connected to this entry, so that the entry author association becomes necessary. Weblog entries may be either public (visible to a reader group) or private (visible to the entry author only). The entities Weblog, WeblogEntry, Person, and Group represent Instances from the meta data model. Instances and their properties are the resources that are to be protected by an access control system. They are stored in persistent storage and retrieved from storage and written on demand. Weblog_Author, Weblog_Reader, Weblog_Owner, WeblogEntry_Author are instances of one-to-many associations; Group_Member is an instance of a manyto-many association. As can be seen from this example, associations serve two purposes. They may express real associations, e.g. WeblogEntry_Weblog expresses a whole-part relationship between weblogs and its entries. Other associations are used to express access control features. Discretionary access control is based on ownership relations. WeblogEntry_Author and Weblog_Owner are two associations that express just this kind of access control relationship. For role-based access control, access rights are given to groups. In this example Weblog_Author and Weblog_Reader together with Group_Member form the associations expressing the role-based part of access control demands in the weblog application. 5. The service model When constructing access control models one has to choose an appropriate level and granularity for protecting resources. It is common practice to realize business applications with a three-tiered architecture. The first tier, the presentation layer, constitutes the front-end. This could e.g. be a web front-end. Business logic is encapsulated in the second tier, whereas the database makes up the third tier. In general, the business logic is structured rather simple. The main task of the business applications consists in processing client requests that essentially do nothing else than retrieving data from persistent storage, display this data for the client and writing back some updated data back to persistent storage. Interactions of clients with the system take place via predefined interfaces that are offered in the presentation layer. Of course, if the application does not have a visual front end, offered services are interfaces that have to be invoked by some other protocol. An example for this kind of service oriented applications is web-services. Operations protected by an access control system may be at different levels of granularity. One extreme may be to protect low-level operations like reading or writing properties of business objects, creating, deleting, reading, or writing associations. Alternatively, access control decisions may be enforced at a medium level, e.g. at the level of methods of business objects. This level offers more contexts of the semantics of protected operations but protected operations have to be mapped to low-level operations

4 of protected resources. The third possibility may be to protect high-level operations, i.e. processing of a complete client request. This procedure offers the most execution context but is also hardest to realize in a complete fashion, since access control enforcement takes place far away from the resources to be protected. Protecting low-level operations is not an appropriate level of abstraction for enforcing access control policies of business applications. Assume two different restriction policies, for creating and editing weblog entries in our example data model. Only members of the author group and the owner of a weblog are allowed to create a new entry. Once the entry is created, the contents may be only edited by the entry author, namely the person who created the entry. During execution of both actions, the properties (text and view in our example) are set. These set-operations map in both cases to the same low level writeoperation of properties. If access control is enforced at this low-level the context of whether these operations take place during creation or editing is lost. Therefore at this low level it cannot be decided whether these write operations should be allowed or denied. Access control could be enforced at the level of methods of business objects (medium level). But the same business method is called during processing several client requests. When changing one access control policy of one business object, it is not immediately clear which kinds of client requests are affected. An appropriate higher-level context is given by service methods. They correspond to the high-level access control context mentioned above. Before giving an example, the service model used in this paper is introduced (see Figure 3). It has a rather simple structure. A service consists of service methods. Clients issue service requests to execute some service method on a specific target. A client is a principal belonging to a session in which the service request is executed. The target is some concrete Instance of a business object. Also the initiator is represented by some Instance for example of Class Person in Figure 2. To execute a service method, some access restrictions must be fulfilled. These restrictions are formalized by path expressions described later in this paper. From the path expression one of two database queries may be built and executed in order to check whether execution of the service method should be allowed. Service ServiceMethod 0.. ServiceRequest authorized_subjects target Session Instance principal Figure 3: Service model PathExpression Every request issued by a client comprises one service method. In our weblog example possible service requests refer to coarse-grained actions of business objects. Service methods for weblog entries might be WeblogEntryCreate for creating a new weblog entry, WeblogEntryRemove for deleting an entry, WeblogEntryEditText for editing the contents of an entry, WeblogEntryMove to move the entry from one weblog to another, WeblogEntrySwitchView to switch from private to public visibility or vice versa. 6. The authorization model As explained above, access restrictions for business applications should be linked to service methods. A security policy should define for every service method a corresponding access restriction. Since the data model of business applications already contains relationships, i.e. associations, useful to describe rolebased and discretionary requirements, the access control model introduced here is based on navigating these relationships in the business application s data model. If we want to check whether some action is allowed to be executed on some target object by some initiating principal, we try to find a path between the target object and the object representing the principal along associations that express the security policy in effect. In other words, access is granted, if starting from the resource accessed navigation along one or more predefined path via associations and properties finally ending at the class representing the calling subject, that is the principal from the service model, is possible.

5 A PathExpression defines a declarative mapping from a given target object to a set of subjects. A ServiceRequest with a given subject s, a target t and a ServiceMethod with a PathExpression authorized_subjects is permitted, if the subject is an element of the set defined by the PathExpression. Class s ServiceMethod. authorized _ subjects( t) Access restrictions may be independent of the target. For example, some access restrictions may express that access is allowed for members of the administrator group independent from the target being accessed. In this case the authorized_subjects does not depend on the parameter t. The access control model consists of the following parts (see figure 4): domain PathExpression range Filter Edge operation value Role (from meta model) Property (from meta model) Class (from meta model) head Concat tail Figure 4: Path model left right Composition Or And Not Edge: An edge is a navigation from one class via an association denoted by a role name to another class. Roles in object orientation are names of association ends (rather than roles in the RBAC sense). Starting from a concrete domain object, navigation to another object is represented by the role name at the association end of the class denoting the range. In case the role name is missing, the name of the associated class can be used instead. If the association end has cardinality, then the result of the navigation will be a single object. If the association end is denoted 0 then the result may be empty. If the association end is, or otherwise denoted greater than one, then the result of the navigation will be a collection of zero, one or more objects. After a single navigation step the resulting collection represents a set since navigation targets are all distinct. Further navigation from a set of objects via a second edge either results in a collection of objects or a collection of sets of objects depending path on whether navigation starts from a single object or a set of objects respectively. Collections of sets are implicitly flattened to single sets with duplicates being removed. Filter: A filter is a path expression where domain and range objects are of the same type. By means of filters the collection resulting from path navigation may be constrained to a subset by restricting the range of values of a property of the object. Filter operators may be e.g. equals, smaller than, greater than, smaller or equal, greater or equal. If the filter is applied to a single domain object, the outcome may either be the one-element set containing the same object or the empty set. If the filter is applied to a set of domain objects, the filter operator will be applied to every element of the set. filter( property, operation, value) { x property. class operation( x, value) = true} Concat: A concatenation connects two paths, the head path with the tail path, to form a single longer path. The type of the range class of the head path must be equal to the type of the domain class of the tail path. head, tail) U tail( y) y head( x) Composition: Two paths with the same target class in the data model may be connected by and or or, meaning that the result contains subjects identified by both paths or at least one path respectively. union( left, right) { y y left( x) y right( x)} intersection( left, right) { y y left( x) y right( x)} Not: Not takes a PathExpression p from a class domain to a class range and yields the set of range objects in the class range that are not member of the set identified by p(domain). not( p) { y p. range y p( x)} 7. Example path expressions

6 To give an example how to apply the above path expressions, access restrictions on the two actions for creating and reading objects of the WeblogEntry-class are given below. The access restriction for calling the service method WeblogEntryCreate to create a new weblog entry is e.g. given by the following constraint given in clear text: Creating a new weblog entry is allowed, if the principal issuing the request is either the owner of the weblog or member of the author group of the weblog the weblog entry is created in. Weblog parent WEBLOGENTRY _WEBLOG WeblogEntry -text: String -view: int author 0.. Group WEBLOG_AUTHOR reader 0.. WEBLOG_READER GROUP_MEMBER member Person owner -name:string WEBLOG_OWNER -isanonymous: boolean WEBLOGENTRY_AUTHOR entryauthor Figure 5: Visualization of path expression for access restriction WeblogEntryCreate Figure 5 visualizes the path expression that must be fulfilled for this access restriction. The Weblog- EntryCreate restriction is a union set consisting of a discretionary and a role-based path. The discretionary path is a concatenation path of two edges (lower path in figure 5): ownerpath = edge(parent), edge(owner)) The role-based path concerning membership of the author group (upper path in figure 5) is a concatenation of three edges: authorpath= edge(parent), edge(author)), edge(member)) The result set of the path navigation is the union of all person objects that are authors with the person object representing the owner. weblogcreatepath = or(ownerpath, authorpath) Since the ownerpath and the authorpath both have a common sub-path, the overall path may also be constructed by using a concatenation of an edge with a union: weblogentrycreatepath = edge(parent), or( edge(author), edge(member)), edge(owner))) Executing the WeblogEntryCreate action is allowed, if the result set includes the caller who is also represented by an object of type person. The usage of filters may be shown by looking at the access restrictions for reading the contents of a weblog entry. The access restriction is as follows: The contents of a weblog entry with private visibility may be read by the entry author only. The contents of a weblog entry with public visibility may be read by all members of the reader group of the weblog the weblog entry belongs to. This access restriction constitutes an if-condition: If the weblog entry is private then the author may read it, otherwise members of the reader group may read it. This if-construct may be described by a union construct. Because a weblog entry may be either private or public, at most one of the two sub paths will yield a result that is not empty. privatepath = filter(view, =, PRIVATE), edge(entryauthor)) publicpath:= concat ( not(filter(view, =, PRIVATE)), edge(parent), edge(reader)), edge(member))) weblogentryreadpath = or(privatepath,publicpath)

7 8. Conclusion This paper shows how to use a simple path expression language to express role-based and discretionary access control in a single, easy to understand format. Since the access control model is based on the object-oriented data model, which by now can be considered a standard for building business applications, it can be applied to a wide range of applications. The service model is kept very simple so that monolithic business applications as well as web services are covered by the presented access control model. Besides subject-oriented access control policies like role-based and discretionary access control, there exist access constraints that are independent of the requesting subject. Examples are workflows, where access of a resource solely depends on the state of the resource. At the moment these cases cannot be covered by path expressions. Future work will include path expressions in reverse order, ending at the target, in order to also cover these resource-oriented access control demands. An advantage of the introduced path expressions is that they have a simple grammar. It is easy to express paths by OCL [6] (not shown in this paper) and annotate the data model with according OCL expressions to make access control policies transparent. Path expressions have a compact notation. Therefore it is possible to use them for mathematical analysis. Also path expressions may be used to automatically construct queries that may be uniformly translated to a database queries. Also access restrictions may be read directly from the data model. Future work will engage in using path expressions in an introspective framework. Then access control restrictions may be read directly from the source code. Also the object-oriented data model allows for some interesting visualization possibilities for showing access control restrictions directly on the data model. 9. References [] Ferraiolo, D. and Sandhu, R. and Gavrila, S. and Kuhn, R. and Chandramouli, R., Proposed NIST Standard for Role-Based Access Control, ACM Transaction on Information and System Security, Vol. 4 (200), No. 3, pp [2] Godik, S. and Moses, T. et al. extensible Access Control Markup Language (XACML), February 2003 [3] Java Security Architecture, API-Specification, (visited February 2005) [4] Lodderstedt, T. and Basin, D. and Doser, J., SecureUML: A UML-Based Modeling Language for Model-Driven Security, In: Jézéquel, J.-M., and Hussmann, H. and Cook, S.: UML 2002 The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tool. 5 th International Conference, Dresden, Germany, September/October Proceedings Vol. 2460, Springer- Verlag, 2002, p [5] OMG, Meta Object Facility (MOF) Specification, April 2002 [6] OMG, UML 2.0 OCL Specification, November 2003

Enhancing UML to Model Custom Security Aspects

Enhancing UML to Model Custom Security Aspects Enhancing UML to Model Custom Security Aspects [Position Paper] Jaime Pavlich-Mariscal, Laurent Michel, and Steven Demurjian Department of Computer Science & Engineering, The University of Connecticut,

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Design Authorization Systems Using SecureUML

Design Authorization Systems Using SecureUML Design Authorization Systems Using SecureUML By Rudolph Araujo & Shanit Gupta, Foundstone Professional Services February 2005 Overview This whitepaper describes the Foundstone SecureUML template, a Microsoft

More information

Web Service Authorization Framework

Web Service Authorization Framework Web Service Authorization Framework Thomas Ziebermayr, Stefan Probst Software Competence Center Hagenberg, Hauptstrasse 99, 4232 Hagenberg, Austria thomas.ziebermayr@scch.at, stefan.probst@scch.at Abstract

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

Secure Document Circulation Using Web Services Technologies

Secure Document Circulation Using Web Services Technologies Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany sbracher@student.bond.edu.au

More information

A Pattern-driven Generation of Security Policies for Service-oriented Architectures

A Pattern-driven Generation of Security Policies for Service-oriented Architectures A Pattern-driven Generation of Security Policies for Service-oriented Architectures Michael Menzel Hasso-Plattner-Institute Prof.-Dr.-Helmert Str. 2-3 14482 Potsdam, Germany michael.menzel @hpi.uni-potsdam.de

More information

Role-based Authorization Constraints Specification Using Object Constraint Language

Role-based Authorization Constraints Specification Using Object Constraint Language Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte gahn@uncc.edu Michael. E. Shin

More information

Administration of Access Control in Information Systems Using URBAC Model

Administration of Access Control in Information Systems Using URBAC Model JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 89-109 Administration of Access Control in Information Systems Using URBAC Model Aneta Poniszewska-Marańda Institute of Information Technology

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

XACML Profile for Role Based Access Control (RBAC)

XACML Profile for Role Based Access Control (RBAC) 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:

More information

Towards a Common Metamodel for the Development of Web Applications

Towards a Common Metamodel for the Development of Web Applications Towards a Common Metamodel for the Development of Web Applications Nora Koch and Andreas Kraus Ludwig-Maximilians-Universität Munich, Germany Motivation Overwhelming diversity of Web methodologies Goal:

More information

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC S. Berhe 1, S. Demurjian 1, S. Gokhale 1, J. Pavlich-Mariscal 2,3,

More information

Completeness, Versatility, and Practicality in Role Based Administration

Completeness, Versatility, and Practicality in Role Based Administration Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović svuk002@ec.auckland.ac.nz Abstract Applying role based administration to role based access control systems has

More information

Business Rule Standards -- Interoperability and Portability

Business Rule Standards -- Interoperability and Portability Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology mlinehan@us.ibm.com Donald F. Ferguson IBM Fellow Software

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

Development of Tool Extensions with MOFLON

Development of Tool Extensions with MOFLON Development of Tool Extensions with MOFLON Ingo Weisemöller, Felix Klar, and Andy Schürr Fachgebiet Echtzeitsysteme Technische Universität Darmstadt D-64283 Darmstadt, Germany {weisemoeller klar schuerr}@es.tu-darmstadt.de

More information

Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development

Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development Traceability Patterns: An Approach to Requirement-Component Traceability in Agile Software Development ARBI GHAZARIAN University of Toronto Department of Computer Science 10 King s College Road, Toronto,

More information

SECTISSIMO: A Platform-independent Framework for Security Services

SECTISSIMO: A Platform-independent Framework for Security Services SECTISSIMO: A Platform-independent Framework for Security Services Mukhtiar Memon, Michael Hafner, and Ruth Breu University of Innsbruck, AUSTRIA {mukhtiar.memon, m.hafner, ruth.breu}@uibk.ac.at Abstract.

More information

Integration of Application Business Logic and Business Rules with DSL and AOP

Integration of Application Business Logic and Business Rules with DSL and AOP Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska and Krzysztof Kasprzyk Wroclaw University of Technology, Wyb. Wyspianskiego 27 50-370 Wroclaw, Poland Bogumila.Hnatkowska@pwr.wroc.pl

More information

A Model-Driven Methodology for Developing Secure Data-Management Applications

A Model-Driven Methodology for Developing Secure Data-Management Applications 1 A Model-Driven Methodology for Developing Secure Data-Management Applications David Basin, Manuel Clavel, Marina Egea, Miguel A. García de Dios, Carolina Dania Abstract We present a novel model-driven

More information

Generating Aspect Code from UML Models

Generating Aspect Code from UML Models Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,

More information

Object Oriented Databases. OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar

Object Oriented Databases. OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar Object Oriented Databases OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar Executive Summary The presentation on Object Oriented Databases gives a basic introduction to the concepts governing OODBs

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,

More information

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,

More information

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.

More information

Proposed NIST Standard for Role-Based Access Control

Proposed NIST Standard for Role-Based Access Control Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, sandhu@gmu.edu or www.list.gmu.edu

More information

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1 The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions

More information

Generating Enterprise Applications from Models

Generating Enterprise Applications from Models Generating Enterprise Applications from Models Vinay Kulkarni, R Venkatesh, Sreedhar Reddy Tata Research Development and Design Centre, 54, Industrial estate, Hadapsar, Pune, 411 013, INDIA { vinayk, rvenky,

More information

MARAH: an RBAC model and its integration in a Web server

MARAH: an RBAC model and its integration in a Web server MARAH: an RBAC model and its integration in a Web server P. Díaz, D. Sanz & I. Aedo Departamento de Informática, Universidad Carlos III de Madrid Abstract Hypermedia systems, whether implemented as web

More information

A methodology for secure software design

A methodology for secure software design A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 ed@cse.fau.edu 1. Introduction A good percentage of the

More information

BUSINESS RULES MANIPULATION MODEL 1

BUSINESS RULES MANIPULATION MODEL 1 ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2007, Vol.36, No.3 BUSINESS RULES MANIPULATION MODEL 1 Liudas Motiejūnas, Rimantas Butleris Kaunas University of Technology Studentų St. 50, LT51368 Kaunas,

More information

Project VIDE Challenges of Executable Modelling of Business Applications

Project VIDE Challenges of Executable Modelling of Business Applications Project VIDE Challenges of Executable Modelling of Business Applications Radoslaw Adamus *, Grzegorz Falda *, Piotr Habela *, Krzysztof Kaczmarski #*, Krzysztof Stencel *+, Kazimierz Subieta * * Polish-Japanese

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 chandramouli@nist.gov

More information

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè. CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection

More information

Modeling Web Applications Using Java And XML Related Technologies

Modeling Web Applications Using Java And XML Related Technologies Modeling Web Applications Using Java And XML Related Technologies Sam Chung Computing & Stware Systems Institute Technology University Washington Tacoma Tacoma, WA 98402. USA chungsa@u.washington.edu Yun-Sik

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2004 Vol. 3, no. 3, March-April 2004 L n RBAC: A Multiple-Levelled Role- Based Access

More information

Components- Based Access Control Architecture

Components- Based Access Control Architecture Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University

More information

Organization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics:

Organization of DSLE part. Overview of DSLE. Model driven software engineering. Engineering. Tooling. Topics: Organization of DSLE part Domain Specific Language Engineering Tooling Eclipse plus EMF Xtext, Xtend, Xpand, QVTo and ATL Prof.dr. Mark van den Brand GLT 2010/11 Topics: Meta-modeling Model transformations

More information

1. INTRODUCTION TO RDBMS

1. INTRODUCTION TO RDBMS Oracle For Beginners Page: 1 1. INTRODUCTION TO RDBMS What is DBMS? Data Models Relational database management system (RDBMS) Relational Algebra Structured query language (SQL) What Is DBMS? Data is one

More information

Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines

Secure State UML: Modeling and Testing Security Concerns of Software Systems Using UML State Machines Research Journal of Applied Sciences, Engineering and Technology 7(18): 3786-3790, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: October 26, 2013 Accepted: December

More information

The BPM to UML activity diagram transformation using XSLT

The BPM to UML activity diagram transformation using XSLT The BPM to UML activity diagram transformation using XSLT Ondřej Macek 1 and Karel Richta 1,2 1 Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University,

More information

Role Based Access Control

Role Based Access Control Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!

More information

Appendix... B. The Object Constraint

Appendix... B. The Object Constraint UML 2.0 in a Nutshell Appendix B. The Object Constraint Pub Date: June 2005 Language The Object Constraint Language 2.0 (OCL) is an addition to the UML 2.0 specification that provides you with a way to

More information

Mapping between Levels in the Metamodel Architecture

Mapping between Levels in the Metamodel Architecture Mapping between Levels in the Metamodel Architecture José Álvarez, Andy Evans 2, Paul Sammut 2 Dpto. de Lenguajes y Ciencias de la Computación, University Málaga, Málaga, 2907, Spain alvarezp@lcc.uma.es

More information

A terminology model approach for defining and managing statistical metadata

A terminology model approach for defining and managing statistical metadata A terminology model approach for defining and managing statistical metadata Comments to : R. Karge (49) 30-6576 2791 mail reinhard.karge@run-software.com Content 1 Introduction... 4 2 Knowledge presentation...

More information

On XACML, role-based access control, and health grids

On XACML, role-based access control, and health grids On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and

More information

UML/OCL based Design and Analysis of Role-Based Access Control Policies

UML/OCL based Design and Analysis of Role-Based Access Control Policies UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, D-28334

More information

Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest

Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Efficient Management of Tests and Defects in Variant-Rich Systems with pure::variants and IBM Rational ClearQuest Publisher pure-systems GmbH Agnetenstrasse 14 39106 Magdeburg http://www.pure-systems.com

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2

More information

Basics of Dimensional Modeling

Basics of Dimensional Modeling Basics of Dimensional Modeling Data warehouse and OLAP tools are based on a dimensional data model. A dimensional model is based on dimensions, facts, cubes, and schemas such as star and snowflake. Dimensional

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Clarifying a vision on certification of MDA tools

Clarifying a vision on certification of MDA tools SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

From Object Oriented Conceptual Modeling to Automated Programming in Java

From Object Oriented Conceptual Modeling to Automated Programming in Java From Object Oriented Conceptual Modeling to Automated Programming in Java Oscar Pastor, Vicente Pelechano, Emilio Insfrán, Jaime Gómez Department of Information Systems and Computation Valencia University

More information

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...

More information

1 File Processing Systems

1 File Processing Systems COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

Modeling Turnpike: a Model-Driven Framework for Domain-Specific Software Development *

Modeling Turnpike: a Model-Driven Framework for Domain-Specific Software Development * for Domain-Specific Software Development * Hiroshi Wada Advisor: Junichi Suzuki Department of Computer Science University of Massachusetts, Boston hiroshi_wada@otij.org and jxs@cs.umb.edu Abstract. This

More information

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the

More information

Rules and Business Rules

Rules and Business Rules OCEB White Paper on Business Rules, Decisions, and PRR Version 1.1, December 2008 Paul Vincent, co-chair OMG PRR FTF TIBCO Software Abstract The Object Management Group s work on standards for business

More information

Web Services: Role Based Access Control with Single Sign-on Architecture

Web Services: Role Based Access Control with Single Sign-on Architecture Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn gershteyn@gmail.com

More information

Modeling the User Interface of Web Applications with UML

Modeling the User Interface of Web Applications with UML Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de

More information

SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q. Exam Code: S90-03A. Exam Name: SOA Design & Architecture

SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q. Exam Code: S90-03A. Exam Name: SOA Design & Architecture SOACertifiedProfessional.Braindumps.S90-03A.v2014-06-03.by.JANET.100q Number: S90-03A Passing Score: 800 Time Limit: 120 min File Version: 14.5 http://www.gratisexam.com/ Exam Code: S90-03A Exam Name:

More information

A UML 2 Profile for Business Process Modelling *

A UML 2 Profile for Business Process Modelling * A UML 2 Profile for Business Process Modelling * Beate List and Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Integration of Application Business Logic and Business Rules with DSL and AOP

Integration of Application Business Logic and Business Rules with DSL and AOP e-informatica Software Engineering Journal, Volume 4, Issue, 200 Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska, Krzysztof Kasprzyk Faculty of Computer

More information

A Common Metamodel for Code Generation

A Common Metamodel for Code Generation A Common Metamodel for Code Generation Michael PIEFEL Institut für Informatik, Humboldt-Universität zu Berlin Unter den Linden 6, 10099 Berlin, Germany piefel@informatik.hu-berlin.de ABSTRACT Models can

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

Towards Integrating Modeling and Programming Languages: The Case of UML and Java

Towards Integrating Modeling and Programming Languages: The Case of UML and Java Towards Integrating Modeling and Programming Languages: The Case of UML and Java Patrick Neubauer, Tanja Mayerhofer, and Gerti Kappel Business Informatics Group, Vienna University of Technology, Austria

More information

CHAPTER 1: CLIENT/SERVER INTEGRATED DEVELOPMENT ENVIRONMENT (C/SIDE)

CHAPTER 1: CLIENT/SERVER INTEGRATED DEVELOPMENT ENVIRONMENT (C/SIDE) Chapter 1: Client/Server Integrated Development Environment (C/SIDE) CHAPTER 1: CLIENT/SERVER INTEGRATED DEVELOPMENT ENVIRONMENT (C/SIDE) Objectives Introduction The objectives are: Discuss Basic Objects

More information

Report. Technical. Technologie-Zentrum Informatik. A Classification Framework Designed for Advanced Role-based Access Control Models and Mechanisms

Report. Technical. Technologie-Zentrum Informatik. A Classification Framework Designed for Advanced Role-based Access Control Models and Mechanisms Technologie-Zentrum Informatik Report Technical 51 A Classification Framework Designed for Advanced Role-based Access Control Models and Mechanisms Christopher Alm Michael Drouineaud Ute Faltin Karsten

More information

Lesson 8: Introduction to Databases E-R Data Modeling

Lesson 8: Introduction to Databases E-R Data Modeling Lesson 8: Introduction to Databases E-R Data Modeling Contents Introduction to Databases Abstraction, Schemas, and Views Data Models Database Management System (DBMS) Components Entity Relationship Data

More information

2. Basic Relational Data Model

2. Basic Relational Data Model 2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Access Control Framework of Personal Cloud based on XACML

Access Control Framework of Personal Cloud based on XACML Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi

More information

Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams

Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams Position Paper Ulrich A. Nickel, Robert Wagner University of Paderborn Warburger Straße 100 D-33098 Paderborn Germany [duke, wag25]@uni-paderborn.de

More information

Towards an Access-Control Metamodel for Web Content Management Systems

Towards an Access-Control Metamodel for Web Content Management Systems Towards an Access-Control Metamodel for Web Content Management Systems Salvador Martínez 1, Joaquin Garcia-Alfaro 3, Frédéric Cuppens 2, Nora Cuppens-Boulahia 2 and Jordi Cabot 1 1 ATLANMOD, & École des

More information

A Framework of Model-Driven Web Application Testing

A Framework of Model-Driven Web Application Testing A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

Design of Visual Repository, Constraint and Process Modeling Tool based on Eclipse Plug-ins

Design of Visual Repository, Constraint and Process Modeling Tool based on Eclipse Plug-ins Design of Visual Repository, Constraint and Process Modeling Tool based on Eclipse Plug-ins Rushiraj Heshi Department of Computer Science and Engineering Walchand College of Engineering, Sangli Smriti

More information

A Java Framework for Multi-Tier Web-Centric Applications Development

A Java Framework for Multi-Tier Web-Centric Applications Development 1 A Java Framework for Multi-Tier Web-Centric Applications Development Davide Brugali, Giuseppe Menga, and Franco Guidi-Polanco Abstract Web-centric applications can be understood as middle-size applications

More information

A Framework for Composable Security Definition, Assurance, and Enforcement

A Framework for Composable Security Definition, Assurance, and Enforcement A Framework for Composable Security Definition, Assurance, and Enforcement J. A. Pavlich-Mariscal Advisors: S. A. Demurjian and L. D. Michel Department of Computer Science & Engineering The University

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

Analysis of the Specifics for a Business Rules Engine Based Projects

Analysis of the Specifics for a Business Rules Engine Based Projects Analysis of the Specifics for a Business Rules Engine Based Projects By Dmitri Ilkaev and Dan Meenan Introduction In recent years business rules engines (BRE) have become a key component in almost every

More information

Overview. Stakes. Context. Model-Based Development of Safety-Critical Systems

Overview. Stakes. Context. Model-Based Development of Safety-Critical Systems 1 2 Model-Based Development of -Critical Systems Miguel A. de Miguel 5/6,, 2006 modeling Stakes 3 Context 4 To increase the industrial competitiveness in the domain of software systems To face the growing

More information

Design by Contract beyond class modelling

Design by Contract beyond class modelling Design by Contract beyond class modelling Introduction Design by Contract (DbC) or Programming by Contract is an approach to designing software. It says that designers should define precise and verifiable

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire akodgire@indiana.edu Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 thomsen@securecomputing.com

More information

Enterprise Application Development Using UML, Java Technology and XML

Enterprise Application Development Using UML, Java Technology and XML Enterprise Application Development Using UML, Java Technology and XML Will Howery CTO Passage Software LLC 1 Introduction Effective management and modeling of enterprise applications Web and business-to-business

More information

Creating Database Tables in Microsoft SQL Server

Creating Database Tables in Microsoft SQL Server Creating Database Tables in Microsoft SQL Server Microsoft SQL Server is a relational database server that stores and retrieves data for multi-user network-based applications. SQL Server databases are

More information

Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction

Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract

More information