Skip to main content

Adaptive Access Control Enforcement in Social Network Using Aspect Weaving

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7240))

Included in the following conference series:

Abstract

Current social network systems support a large range of applications with very different security requirements. Even if available social network solutions provide some security functionalities, users do not control these functionalities and cannot customize them to handle their specific security needs. In this paper, we suggest a new approach to handle these issues. This approach is based on Aspect Oriented Programming (AOP) which enables the enforcement of an independent, reusable access control policy through the modification of the program at runtime. This makes possible to externalize the security concerns and weave them into an existing social network. Using this approach, it is possible to customize security of social network at different levels. First, one can specify the global security policy of the particular social network application and then, each member of this social network can further refine this global policy to specify their specific security requirements. This approach is illustrated on the open source social network system Elgg.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 120–131. IEEE (2003)

    Google Scholar 

  2. Sharma, M.: Elgg social networking. Packt Publishing, Birmingham (2008)

    Google Scholar 

  3. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29, 38–47 (1996)

    Article  Google Scholar 

  4. Sheiko, D.: Aspect-oriented software development and php (May 22, 2010), http://dsheiko.com/weblog/aspect-oriented-software-development-and-php

  5. Gao-Feng, J., Yong, T., Yun-Cheng, J., Hong-Yi, Y.: A description logic approach to represent and extend rbac model. In: 1st International Symposium on Pervasive Computing and Applications, pp. 151–156 (2006)

    Google Scholar 

  6. Ferraiolo, D., Kuhn, D.: Role-based access controls. Arxiv preprint arXiv:0903.2171 (2009)

    Google Scholar 

  7. Roos Lindgreen, E., Herschberg, I.: On the validity of the bell-la padula model. Computers & Security 13, 317–333 (1994)

    Article  Google Scholar 

  8. Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63, 1278–1308 (1975)

    Article  Google Scholar 

  9. Thomas, R.K.: Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the Second ACM Workshop on Role-Based Access Control, pp. 13–19. ACM (1997)

    Google Scholar 

  10. Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security 7, 285–305 (2008)

    Article  Google Scholar 

  11. Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: Motorbac 2: a security policy tool. In: 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008), Loctudy, France, pp. 273–288 (2008)

    Google Scholar 

  12. Cuppens, F., Miege, A.: Adorbac: an administration model for or-bac. International Journal of Computer Systems Science & Engineering 19, 151–162 (2004)

    Google Scholar 

  13. Laddad, R.: Aspectj in action. Practical Aspect Oriented Programming (2009)

    Google Scholar 

  14. Wand, M., Kiczales, G., Dutchyn, C.: A semantics for advice and dynamic join points in aspect-oriented programming. ACM Transactions on Programming Languages and Systems (TOPLAS) 26, 890–910 (2004)

    Article  Google Scholar 

  15. Lämmel, R.: Declarative aspect-oriented programming. In: ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation, pp. 131–146 (1999)

    Google Scholar 

  16. De Win, B., Joosen, W., Piessens, F.: Aosd & security: a practical assessment. In: Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT 2003), Citeseer, pp. 1–6 (2003)

    Google Scholar 

  17. Huang, M., Wang, C., Zhang, L.: Toward a reusable and generic security aspect library. AOSD: AOSDSEC 4 (2004)

    Google Scholar 

  18. Parnas, D.: On the criteria to be used in decomposing systems into modules. Communications of the ACM 15, 1053–1058 (1972)

    Article  Google Scholar 

  19. Chen, K., Lin, C.: An Aspect-Oriented Approach to Declarative Access Control for Web Applications. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 176–188. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. De Win, B., Vanhaute, B., De Decker, B.: Security through aspect-oriented programming. Advances in Network and Distributed Systems Security, 125–138 (2002)

    Google Scholar 

  21. De Win, B., Piessens, F., Joosen, W., Verhanneman, T.: On the importance of the separation-of-concerns principle in secure software engineering. In: Workshop on the Application of Engineering Principles to System Security Design, WAEPSSD, Boston, MA, USA (2002)

    Google Scholar 

  22. Viega, J., Bloch, J., Chandra, P.: Applying aspect-oriented programming to security. Cutter IT Journal 14, 31–39 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cuppens, F., Cuppens-Boulahia, N., Pena Viña, E. (2012). Adaptive Access Control Enforcement in Social Network Using Aspect Weaving. In: Yu, H., Yu, G., Hsu, W., Moon, YS., Unland, R., Yoo, J. (eds) Database Systems for Advanced Applications. DASFAA 2012. Lecture Notes in Computer Science, vol 7240. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29023-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29023-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29022-0

  • Online ISBN: 978-3-642-29023-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics