of security services. The roles and relationships
between security components provide defence in
depth, to any strength and depth required for a given
situation. The concept and usage of roles in a
dynamic manner provides a practical and flexible
way to implement fine–grained access controls.
ACKNOWLEDGEMENTS
The authors would like to thank Scott Cluett for his
valuable insight. Scott’s implementation of many
aspects of this model provided the grounding
required to make the model practical, and provided
useful validation of its concepts and structures.
REFERENCES
Buecker, Axel, Filip, Werner, Becke, Richard, Cowan,
Tony, Godbole, Subodh, Hinton, Heather,
Kariyawasam, Sampath, Stranden, Harri, 2004,
‘Federated Identity Management with IBM Tivoli
Security Solutions’, IBM Redbooks, First Edition.
Basin, David, Doser, Jürgen, Lodderstedt, Torsten, 2004,
‘Model Driven Security: From UML Models to
Access Control Infrastructures’, ACM Transactions on
Software Engineering and Methodology, Vol. 15, No.
1, pp. 39–91.
Blakely, Bob, Heath, Craig & members of The Open
group Security Forum, 2004, Technical Guide –
Security Design Patterns, viewed January 2005,
<http://www.opengroup.org/bookstore/catalog/g031.ht
m>.
Bücker, Axel, Gontarczyk, Andrew, Heiser, Mari,
Karekar, Santosh, Saunders, Patricia, Taglioni,
Matteo, 2004, ‘Enterprise Security Architecture Using
IBM Tivoli Security Solutions’ IBM Redbooks,
Second Edition.
Clarke, Siobhán, Harrison, William, Ossher, Harold, Tarr,
Peri, 1999, ‘Subject–Oriented Design: Towards
Improved Alignment of Requirements, Design and
Code’, OOPSLA ’99 Proceedings, pp. 325–339.
CSE, 2003, IT Security Zones Baseline Security
Requirements, Sue Greaves, Communications Security
Establishment, Ottawa.
CSE, n.d., Introduction to Information Technology
Security, viewed January 2006, <http://www.cse-
cst.gc.ca/tutorials/english/section1/m1/index_e.htm>.
Entrust, 2003, Privilege Management Infrastructure Using
Getaccess Version 7 – Detailed Architecture Report,
from Contract: W2213-2-6111, CSE, Ottawa.
Ferraiolo, David, Kuhn, Rick, 1995, An Introduction to
Role–Based Access Control, NIST/ITL Bulletin,
viewed January 2006, <http://csrc.nist.gov/rbac/NIST-
ITL-RBAC-bulletin.html>.
IBM Microsoft, 2003, Federation of Identities in a Web
Services World, viewed February 2005, <http://www-
128.ibm.com/developerworks/library/specification/ws-
fedworld/>.
IBM, 2005, ‘Federated Identity Management and Web
Services Security with IBM Tivoli Security Solutions’,
IBM Redbooks, Second Edition.
Indrakshi, Ray, Li, Na, France, Robert, Dae–Kyoo, Kim,
2004, ‘Using UML to Visualize Role–Based Access
Control Constraints’, Proceedings of SACMAT ’04,
pp. 115–124.
International Organization for Standardization, 1989,
Information Processing Systems – Open Systems
Interconnection – Basic Reference Model – Part 2:
Security architecture, ISO 7498-2:1989, International
Organization for Standardization, Geneva.
International Organization for Standardization, 2002,
Security techniques — Security information objects for
access control, ISO/IEC 15816:2002, International
Organization for Standardization, Geneva.
Jürgens, Jan, 2002, ‘UMLSec: Extending UML for Secure
Systems Development’, UML 2002 - The Unified
Modeling Language Proceedings, pp. 412–425.
Kendall, Elizabeth, 1999, ‘Role Model Designs and
Implementations with Aspect–oriented Programming’,
OOPSLA ’99 Proceedings, pp. 353–369.
Lodderstedt, Torsten, Basin, David, Doser, Jürgen, 2002,
‘SecureUML: A UML-Based Modeling Language for
Model-Driven Security’, UML 2002 - The Unified
Modeling Language Proceedings, pp. 426–441
Miller, Mark, Yee, Ka–Ping, Shapiro, Jonathan, 2003,
Capability Myths Demolished, Technical Report
SRL2003-02, Johns Hopkins University Systems
Research Laboratory, Baltimore.
Organization for the Advancement of Structured
Information Standards, 2005a, eXtensible Access
Control Markup Language, XACML Version 2.0,
OASIS, Billerica.
Organization for the Advancement of Structured
Information Standards, 2005b, Assertions and
Protocols for the OASIS Security Assertion Markup
Language (SAML) V2.0, OASIS, Billerica.
Tulloch, Mitch, 2003, Microsoft Encyclopedia of Security.
Microsoft Press, Redmond.
Yoder, Joseph, Barcalow, Jeffrey, 1997, ‘Architectural
Patterns for Enabling Application Security, PloP ’97
Proceedings.
© Her Majesty the Queen in Right of Canada, 2007
ICEIS 2007 - International Conference on Enterprise Information Systems
364