0% Complete
Home
/
11th International Conference on Computer and Knowledge Engineering
Automatic Generation of XACML Code using Model-Driven Approach
Authors :
Athareh Fatemian
1
Bahman Zamani
2
Marzieh Masoumi
3
Mehran Kamranpour
4
Behrouz Tork Ladani
5
Shekoufeh Kolahdouz Rahimi
6
1- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
2- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
3- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
4- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
5- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
6- MDSE Research Group, Faculty of Computer Engineering University of Isfahan
Keywords :
Access Control Policies, XACML, ABAC, RBAC, MDE, DSML
Abstract :
Precise specification of security requirements of software systems in general, and access control policies in particular, is a critical issue. The eXtensible Access Control Markup Language (XACML) is a well-known standard for defining access control policies. The problem is that using this language and manual formulation of policies requires technical knowledge and is error prone. To address this challenge, we propose a Domain-Specific Modeling Language (DSML), called Dual-XACML that supports both Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). As the tool support, a graphical editor as well as a transformation engine has been developed in this research. The graphical editor allows the user to create a model of access control policies for the target system. Then, using the transformations, the model is transformed into the corresponding XACML code. To evaluate the proposed approach, the XACML code of a typical system is generated, automatically.
Papers List
List of archived papers
Diagnosis of Depression Based on New Features Extractive from the Frequency Space of the EEG
Melika Changizi - Saeid Rashidi
T-Rank: Graph Data Analytics for Urban Traffic Modeling
Alireza Safarpour - Iman Gholampour - Amirhossain Aghazadeh Fard - Seyed Mohammad Karbasi
FGM Copula based Analysis of Coverage Region for Wireless Three-User Multiple Access Channel with Correlated Channel Coefficients
Mona Sadat Mohsenzadeh - Ghosheh Abed Hodtani
Divide and Conquer Approach to Long Genomic Sequence Alignment
Mahmoud Naghibzadeh - Samira Babaei - Behshid Behkmal - Mojtaba Hatami
Automatic Generation of XACML Code using Model-Driven Approach
Athareh Fatemian - Bahman Zamani - Marzieh Masoumi - Mehran Kamranpour - Behrouz Tork Ladani - Shekoufeh Kolahdouz Rahimi
A Review on Secure Data Storage and Data Sharing Technics in Blockchain-based IoT Healthcare Systems
Seyedeh Somayeh Fatemi Nasab - Davoud Bahrepour - Seyed Reza Kamel Tabbakh
Improvement of Credit Scoring by LSTM Autoencoder Model
Milad Sattari Maleki - Seyedeh Niusha Motevallian - Faezehsadat Hosseini - Mohammad Sabokrou - Hamidreza Soltanalizadeh Maleki
A Novel Density-Based KNN in Pattern Recognition
Sajad Haghzad Klidbary - Abazar Arabameri
Improved TrustChain for Lightweight Devices
Seyed Salar Ghazi - Haleh Amintoosi
PowerLinear Activation Functions with application to the first layer of CNNs
Kamyar Nasiri - Kamaledin Ghiasi-Shirazi
more
Samin Hamayesh - Version 41.7.6