Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2016, Volume 28, Issue 3, Pages 35–50
DOI: https://doi.org/10.15514/ISPRAS-2016-28(3)-3
(Mi tisp36)
 

Model of security for object-oriented and object-attributed applications

Pavel P. Oleynika, Sergey M. Salibekyanb

a Platov Southern Russian State Polytechnic University (NPI)
b National Research University "Higher School of Economics" (NRU HSE), Institute of Electronics and Mathematics
References:
Abstract: The article describes two approaches for control access rights based on role approach (RBAC) and the use of tables (lists) access rights (ACL). At first, an overview of modern approaches to information security and control user access rights of applications with different architectures is provided. After that, two author's methods of data protection is described. The first approach was developed for the protection of object-oriented applications, the second approach was developed for object-attribute applications used to operating network (graph) databases and knowledge bases. The focus of attention is the first author's approach based on the description of access rights for classes, attributes of classes and objects that has a certain criterion. The approach is implemented by the use of a class hierarchy, composition and structure describing in detail in the article. The article gives examples of specific information systems developed by the first author: information system for scientific conferences that was repeatedly used at the conference "Object systems" (objectsystems.ru) and information system of the beauty salon. Further focus is on the second approach required development of new technique to the information security of network (graph) information structures. The approach developed by second author fully duplicates the functionality of the first approach. In particular, it provides permissions copy when copying of the network data structure, just as in the object-oriented paradigm is a transfer of the properties of parent to child class; the article gives a detailed description of such mechanism. For access control, the method involves the use of a special virtual device. Information about access rights is linked to the node network (graph) if restrict access is needed.
Keywords: Security of information systems, Object-oriented applications, Object System Metamodel, Model of Permissions, object-attribute approach.
Bibliographic databases:
Document Type: Article
Language: English
Citation: Pavel P. Oleynik, Sergey M. Salibekyan, “Model of security for object-oriented and object-attributed applications”, Proceedings of ISP RAS, 28:3 (2016), 35–50
Citation in format AMSBIB
\Bibitem{OleSal16}
\by Pavel~P.~Oleynik, Sergey~M.~Salibekyan
\paper Model of security for object-oriented and object-attributed applications
\jour Proceedings of ISP RAS
\yr 2016
\vol 28
\issue 3
\pages 35--50
\mathnet{http://mi.mathnet.ru/tisp36}
\crossref{https://doi.org/10.15514/ISPRAS-2016-28(3)-3}
\elib{https://elibrary.ru/item.asp?id=26605245}
Linking options:
  • https://www.mathnet.ru/eng/tisp36
  • https://www.mathnet.ru/eng/tisp/v28/i3/p35
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:113
    Full-text PDF :72
    References:32
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024