Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.9.2082

Type based Access Control Model and Application of Rehabilitation Psychology Analysis System  

Kim, Young-Soo (Research and Business Foundation, Korea Nazarene University)
Kim, Jung-Dae (Research and Business Foundation, Korea Nazarene University)
Abstract
As rehabilitation psychology analysis system which manages examination information becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. We propose a security model on the type information based access control system for rehabilitation psychology analysis that can enhance both security and availability by separating the functions delivered from object-oriented databases to solve these problems. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.
Keywords
Rehabilitation psychology; Psychology analysis; Access control; Type Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Elisa, B., et al., "An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning," ACM Transactions on Database Systems, 23(3), 2012
2 Evered, M., "A Two-Level Architecture for Semantic Protection of Persistent Distributed Objects," Proc, Intl. Conf. on Software Methods and Tools, Heidelberg 2012.
3 Hale, J., J. Threet, S. Shenoi, "A framework for high assurance security of distributed objects," in Database Security, Chapman and Hall, London, pp.99-115, 2011.
4 Hale, J., J. Threet, and S. Shenoi, Capability-based primitives for access control in object-oriented systems, in Database Security, Chapman and Hall, London, pp. 134-150, 2010.
5 Joon P., and S. Ravi, "RBAC on the web by smart certificates." In Proceedings of 4th ACM Workshop on Role-Based Access Control. ACM, Fairfax, VA, October pp. 28-29 2011
6 Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, 2. pp. 44-52, 2011.
7 Karjoth, G., "Authorization in CORBA Security," In Proceedings of Fifth European Symposium on Research in Computer Security, pp. 143-158, 2010.
8 Pernul, G., A. M. Tjoa and W. Winiwarter, Modelling Data Secrecy And Integrity, Data & Knowledge Engineering, Vol. 26, pp. 291-308, 2011.
9 Reddy M., ORBs & ODBMS : "Two complementary ways to distribute objects," Object Magazine, pp. 24-30, June, 2010.
10 Blakley, B., R. Blakley and R.M. Soley, CORBA Security: An Introduction to Safe Computing with Objects, Addison-Wesley, 2010.
11 Byrne R, M. Roantree, "An Object Architecture for ODMG Database," Proceeding of the 34th International HICSS Conference, IEEE Computer Press 2010.
12 Cuppens, F. and A. Gabillon "A logical approach to model a multilevel object oriented database," in Database Security, Chapman and Hall, London, pp.145-166, 2010.