Composing access control policies of distributed components

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Software realization of Distributed Computing Systems (DCS) is achieved through the Component Based Software Development (CBSD) approach. DCS are generated by composing individual components. While creating such DCS, care must be taken to include the aspects of access control and obtain the resultant access control policy as a function of individual access control policies of the underlying components. A formal framework is needed to achieve this task of composing access control policies. In this paper, we propose an algebra that enables the composition of access control policies of individual components using the interaction patterns between them. A case study is presented which justifies the proposed algebra. © 2006 IEEE.

Cite

CITATION STYLE

APA

Tilak, O. J., Raje, R. R., & Xukai, Z. (2006). Composing access control policies of distributed components. In Proceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006 (pp. 301–307). https://doi.org/10.1109/DASC.2006.27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free