Encontrados 36 documentos, a visualizar página 1 de 4

Ordenado por Data

Extending RBAC model to control sequences of CRUD expressions

Pereira, Óscar Mortágua; Regateiro, Diogo Domingues; Aguiar, Rui L.

In database applications, access control is aimed at requests are mainly formalized by Create, Read, Update and Delete (CRUD)expressions. The supervision process can be formalized at a high level, such as based on the RBAC model, but in the end the relevant aspect is the data being accessed through each CRUD expression. In critical database applications access control can be enforced not on a CRUD by CRUD bas...


DACA: architecture to implement dynamic access control mechanisms on business t...

Pereira, Óscar Narciso Mortágua

Access control is a software engineering challenge in database applications. Currently, there is no satisfactory solution to dynamically implement evolving fine-grained access control mechanisms (FGACM) on business tiers of relational database applications. To tackle this access control gap, we propose an architecture, herein referred to as Dynamic Access Control Architecture (DACA). DACA allows FGACM to be dyn...


A Concurrent Tuple Set Architecture for Call Level Interfaces

Pereira, Óscar M.; Aguiar, Rui L.; Santos, Maribel Yasmina

Call Level Interfaces (CLI) are low level API aimed at providing services to connect two main components in database applications: client applications and relational databases. Among their functionalities, the ability to manage data retrieved from databases is emphasized. The retrieved data is kept in local memory structures that may be permanently connected to the host database. Client applications, beyond the...


Reusable Business Tier Architecture driven by a wide typed service

Pereira, Óscar M.; Aguiar, Rui L.; Santos, Maribel Yasmina

Call Level Interfaces (CLI) are difficult to use mainly in intensive database applications with many Create, Read, Update and Delete (CRUD) expressions. As low level API, they are not suited to promote the development process of business tiers as reusable components, leading to the need of writing additional source code whenever a new CRUD expression is needed. To tackle this gap, this paper proposes an archite...


Runtime values driven by access control policies : statically enforced at the l...

Pereira, Óscar M.; Aguiar, Rui L.; Santos, Maribel Yasmina

Access control is a key challenge in software engineering, especially in relational database applications. Current access control techniques are based on additional security layers designed by security experts. These additional security layers do not take into account the necessary business logic leading to a separation between business tiers and access control mechanisms. Moreover, business tiers are built fro...


Runtime values driven by access control policies: statically enforced at the le...

Pereira, Óscar Mortágua; Aguiar, Rui L.; Santos, Maribel Yasmina

Access control is a key challenge in software engineering, especially in relational database applications. Current access control techniques are based on additional security layers designed by security experts. These additional security layers do not take into account the necessary business logic leading to a separation between business tiers and access control mechanisms. Moreover, business tiers are built fro...


ACADA: Access Control-driven Architecture with Dynamic Adaptation

Pereira, Óscar Narciso Mortágua; Aguiar, Rui L.; Santos, Maribel Yasmina

Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent compon...


ACADA : access control-driven architecture with dynamic adaptation

Pereira, Óscar M.; Aguiar, Rui L.; Santos, Maribel Yasmina

Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent compon...


ORCA : architecture for business tier components driven by dynamic adaptation a...

Pereira, Óscar M.; Aguiar, Rui L.; Santos, Maribel Yasmina

Call Level Interfaces (CLI) play a key role in database applications whenever performance is a key requirement. SQL statements are encoded inside strings this way keeping the power and the expressiveness of the SQL language. Unfortunately, despite this significant advantage, CLI do not promote the development of business tier components, much less for business tier components driven by dynamic adaptation. To ta...


Context storage using NoSQL

Santos, Nuno; Pereira, Óscar Narciso Mortágua; Gomes, Diogo

With the ubiquity and pervasiveness of mobile computing, together with the increasing number of social networks, end-users have learned to live and share all kinds of information about themselves. As an example, Facebook reports that it has currently 500 million active users, 200 million of which access its services on mobile systems; moreover, users that access Facebook through mobile applications are twice as...


36 Resultados

Texto Pesquisado

Refinar resultados

Autor











Data










Tipo de Documento





Recurso




Assunto















    Financiadores do RCAAP

Fundação para a Ciência e a Tecnologia Universidade do Minho   Governo Português Ministério da Educação e Ciência Programa Operacional da Sociedade do Conhecimento União Europeia