TY - GEN
T1 - A novel approach for the development and deployment of security patterns
AU - Mourad, Azzam
AU - Otrok, Hadi
AU - Baajour, Lama
PY - 2010
Y1 - 2010
N2 - In this paper, we address the problems related to the applicability and useability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, specification and deployment. Our approach allows the security experts to deliver their security patterns that describe the steps and actions required for security solutions, including detailed information on how and where to integrate each one of them. It also provides the pattern users with the capabilities to deploy well-defined security solutions. The pattern users are required to have knowledge in AOP with minimal expertise in the corresponding security solution domain. Moreover, we design and implement the RBAC (Role Based Access Control) model for a Library Circulation system called RBAC-LB. The elaborated RBACLB model illustrates all the procedures and mechanisms of the approach phases and provides authentication/access control features for the library system.
AB - In this paper, we address the problems related to the applicability and useability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, specification and deployment. Our approach allows the security experts to deliver their security patterns that describe the steps and actions required for security solutions, including detailed information on how and where to integrate each one of them. It also provides the pattern users with the capabilities to deploy well-defined security solutions. The pattern users are required to have knowledge in AOP with minimal expertise in the corresponding security solution domain. Moreover, we design and implement the RBAC (Role Based Access Control) model for a Library Circulation system called RBAC-LB. The elaborated RBACLB model illustrates all the procedures and mechanisms of the approach phases and provides authentication/access control features for the library system.
UR - http://www.scopus.com/inward/record.url?scp=78649248232&partnerID=8YFLogxK
U2 - 10.1109/SocialCom.2010.135
DO - 10.1109/SocialCom.2010.135
M3 - Conference contribution
AN - SCOPUS:78649248232
SN - 9780769542119
T3 - Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust
SP - 914
EP - 919
BT - Proceedings - SocialCom 2010
T2 - 2nd IEEE International Conference on Social Computing, SocialCom 2010, 2nd IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010
Y2 - 20 August 2010 through 22 August 2010
ER -