際際滷s from a talk given at our weekly lab seminar at NII, Tokyo. The talk is mostly based on Christopher Bailey et al's paper on "Self-Adaptive Federated Authorization Infrastructures", as well as related work I was involved with.
2. C. Bailey, D. Chadwick, R.
de Lemos, Self-adaptive
federated authorization
infrastructures.
JCSS, 2014
3. C. Bailey, L.
Montrieux, R. de Lemos,
Y. Yu, M. Wermelinger,
Run-time generation,
transformation, and
verification of access
control models for
self-protection.
SEAMS14
4. L. Montrieux, C. Bailey, R.
de Lemos, A. Bandara,
Engineering self-adaptive
authorisation
infrastructures.
Draft.
14. Sinclair et al, 2007
We have been cited examples
in which 50-90% of the
individuals with access to
particular data store also
have legacy access to
information that they no
longer need.
16. Cheng et al., 2009
Self-adaptive systems are
systems that are able to
modify their behaviour and/
or structure in response
changes that occur to the
system itself, its
environment, or even its
goals.
17. Montrieux et al, draft
Self-adaptive authorisation
infrastructures refer to the
run-time adaptation of the
collection of authorisation
policies and their
enforcement.
18. Bailey et al, 2014
Federated authorisation
infrastructures [] build
upon existing authorisation
models []. [They] provide
the method through which
large scale distributed
access can be granted.
34. Planner Analyser
Behaviour
Model
Authorisation
Infrastructure
Model
Executor Asset Monitor
Behaviour
Gauges
Identity
Provider
Authorisation
Service
Rules &
Attributes
Tailored Solutions
Plan
Get
Behaviour
Set
BehaviourRBAC/ABAC
Constructs
Get
Attributes
Active
Policies
Access
Requests/Decisions
Attribute
Assignment
New Policies
54. Planner Analyser
Behaviour
Model
Authorisation
Infrastructure
Model
Executor Asset Monitor
Behaviour
Gauges
Identity
Provider
Authorisation
Service
Rules &
Attributes
Tailored Solutions
Plan
Get
Behaviour
Set
BehaviourRBAC/ABAC
Constructs
Get
Attributes
Active
Policies
Access
Requests/Decisions
Attribute
Assignment
New Policies
61. References
C. Bailey, D. W. Chadwick, and R. de Lemos, Self-adaptive federated
authorization infrastructures, Journal of Computer and System
Sciences, vol. 80, no. 5, pp. 935952, Aug. 2014.
C. Bailey, L. Montrieux, R. de Lemos, Y. Yu, and M. Wermelinger, Run-
time generation, transformation, and verification of access control
models for self-protection, in SEAMS14: 9th International Symposium
on Software Engineering for Adaptive and Self-Managing Systems,
Hyderabad, India, 2014.
B. H. C. Cheng, R. de Lemos, H. Giese, P. Inverardi, J. Magee, J.
Andersson, B. Becker, N. Bencomo, Y. Brun, B. Cukic, G. D. M.
Serugendo, S. Dustdar, A. Finkelstein, C. Gacek, K. Geihs, V. Grassi,
G. Karsai, H. M. Kienle, J. Kramer, M. Litoiu, S. Malek, R. Mirandola,
H. A. M端ller, S. Park, M. Shaw, M. Tichy, M. Tivoli, D. Weyns, and J.
Whittle, Software Engineering for Self-Adaptive Systems: A Research
Roadmap, in Software Engineering for Self-Adaptive Systems, B. H. C.
Cheng, R. de Lemos, H. Giese, P. Inverardi, and J. Magee, Eds.
Springer Berlin Heidelberg, 2009, pp. 126
S. Sinclair, S. W. Smith, S. Trudeau, M. E. Johnson, and A. Portera,
Information Risk in Financial Institutions: Field Study and Research
Roadmap, in Enterprise Applications and Services in the Finance
Industry, D. J. Veit, D. Kundisch, T. Weitzel, C. Weinhardt, F. A.
Rabhi, and F. Rajola, Eds. Springer Berlin Heidelberg, 2007, pp. 165
180.
62. Image Credits
All screen captures are from
the film Monthy Python and
the Holy Grail (1975)
Snakes and Ladders, Len
Matthews, CC by-nd 2.0
https://goo.gl/3j3KF4