.

2010 IEEE Second International Conference on Social Computing

LAUR Repository

Show simple item record

dc.coverage.spatial Minneapolis, MN, USA en_US
dc.creator Mourad, Azzam en_US
dc.creator Otrok, Hadi en_US
dc.creator Baajour, Lama en_US
dc.date.accessioned 2017-03-09T07:55:13Z
dc.date.available 2017-03-09T07:55:13Z
dc.identifier.isbn 978-0-7695-4211-9 en_US
dc.identifier.uri http://hdl.handle.net/10725/5336
dc.description.abstract In this paper, we address the problems related to the applicability and useability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, specification and deployment. Our approach allows the security experts to deliver their security patterns that describe the steps and actions required for security solutions, including detailed information on how and where to integrate each one of them. It also provides the pattern users with the capabilities to deploy well defined security solutions. The pattern users are required to have knowledge in AOP with minimal expertise in the corresponding security solution domain. Moreover, we design and implement the RBAC (Role Based Access Control) model for a Library Circulation system called RBAC-LB. The elaborated RBACLB model illustrates all the procedures and mechanisms of the approach phases and provides authentication/access control features for the library system. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.title 2010 IEEE Second International Conference on Social Computing en_US
dc.title A novel approach for the development and deployment of security patterns en_US
dc.type Conference Paper / Proceeding en_US
dc.creator.school SAS en_US
dc.creator.identifier 200904853 en_US
dc.creator.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.keywords Libraries en_US
dc.keywords Authentication en_US
dc.keywords Software en_US
dc.keywords Access control en_US
dc.keywords Programming en_US
dc.keywords Databases en_US
dc.identifier.doi http://dx.doi.org/10.1109/SocialCom.2010.135 en_US
dc.identifier.ctation Mourad, A., Otrok, H., & Baajour, L. (2010, August). A novel approach for the development and deployment of security patterns. In Social Computing (SocialCom), 2010 IEEE Second International Conference on (pp. 914-919). IEEE. en_US
dc.creator.email azzam.mourad@lau.edu.lb en_US
dc.date.created 20-22 Aug. 2010 en_US
dc.description.pages 914-919
dc.description.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://ieeexplore.ieee.org/abstract/document/5591424/ en_US
dc.identifier.orcid https://orcid.org/0000-0001-9434-5322
dc.identifier.orcid https://orcid.org/0000-0001-9434-5322 en_US
dc.date.datepublished 2010 en_US
dc.creator.ispartof Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account