RUS  ENG
Full version
JOURNALS // Proceedings of the Institute for System Programming of the RAS // Archive

Proceedings of ISP RAS, 2016 Volume 28, Issue 3, Pages 35–50 (Mi tisp36)

Model of security for object-oriented and object-attributed applications

Pavel P. Oleynika, Sergey M. Salibekyanb

a Platov Southern Russian State Polytechnic University (NPI)
b National Research University "Higher School of Economics" (NRU HSE), Institute of Electronics and Mathematics

Abstract: The article describes two approaches for control access rights based on role approach (RBAC) and the use of tables (lists) access rights (ACL). At first, an overview of modern approaches to information security and control user access rights of applications with different architectures is provided. After that, two author's methods of data protection is described. The first approach was developed for the protection of object-oriented applications, the second approach was developed for object-attribute applications used to operating network (graph) databases and knowledge bases. The focus of attention is the first author's approach based on the description of access rights for classes, attributes of classes and objects that has a certain criterion. The approach is implemented by the use of a class hierarchy, composition and structure describing in detail in the article. The article gives examples of specific information systems developed by the first author: information system for scientific conferences that was repeatedly used at the conference "Object systems" (objectsystems.ru) and information system of the beauty salon. Further focus is on the second approach required development of new technique to the information security of network (graph) information structures. The approach developed by second author fully duplicates the functionality of the first approach. In particular, it provides permissions copy when copying of the network data structure, just as in the object-oriented paradigm is a transfer of the properties of parent to child class; the article gives a detailed description of such mechanism. For access control, the method involves the use of a special virtual device. Information about access rights is linked to the node network (graph) if restrict access is needed.

Keywords: Security of information systems, Object-oriented applications, Object System Metamodel, Model of Permissions, object-attribute approach.

Language: English

DOI: 10.15514/ISPRAS-2016-28(3)-3



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024