Secure application development section

This assignment is aimed to let you practice Security and Trust in Software Architecture design. Assume we are developing a management system for a
library system. In this system, users can borrow and return books, managers can add and delete books from the system. Your work is to use the UML class
diagram to design a role-based access control for this system.
(1) Design the framework and draw the structure by using the UML class diagram (6 points). The designed framework should include at least three objects:
book, user, manager.
(2) Based on the diagram, write no less than 200 words to explain how your designed structure conforms to at least three security principles for computer
security. (2 points)
(3) The structure should demonstrate how access control is managed. Based on the diagram, please write no less than 100 words to explain how access
control works. (2 points)
You don’t need to really implement the decentralized function in your final project. This is only a design for this assignment.

 

Sample Solution

The proposed framework for role-based access control in the library management system is outlined below using a UML class diagram. This diagram shows the three main objects in the system: Book, User, and Manager. The Book object will represent the books that are available to be borrowed or returned by users and managed by managers. The User object represents any user who can borrow and return books while the manager object represents those individuals responsible for adding and deleting books from the system.

The framework also includes several other objects including roles, permissions, rules, policies, access control lists (ACLs), authentication methods as well as authorization mechanisms. These components work together to ensure only authorized users have access to particular functions within the library management system such as borrowing or returning a book or adding/deleting a book from the system (Kumar & Baghel., 2019).

Authentication methods provide ways of verifying identity such as identification cards or passwords which help protect against unauthorised use of resources. Authorization mechanisms then determine what activities each user is allowed to undertake based on their assigned roles. Rules define how these permissions can be used while policies set out guidelines for how they should be applied (Kumar & Baghel., 2019). Access Control Lists specify which operations can be performed by each user while roles assign specific capabilities based on job duties (van der Merwe et al., 2018).

In conclusion, this UML diagram outlines a basic framework for role-based access control in library management systems. It utilizes authentication methods to verify identity followed by authorization mechanisms that grant different levels of access depending on given roles with detailed rules & policies governing application procedures.

 

understudies. Given the expected worth of such figures propelling scholastic achievement and hence impacting results like maintenance, wearing down, and graduation rates, research is justified as it might give understanding into non-mental techniques that could be of possible benefit to this populace (Lamm, 2000) . Part I: INTRODUCTION TO THE STUDY Introduction The country is encountering a basic lack of medical care suppliers, a deficiency that is supposed to increment in the following five years, similarly as the biggest populace in our country’s set of experiences arrives at the age when expanded clinical consideration is essential (Pike, 2002). Staffing of emergency clinics, centers, and nursing homes is more basic than any time in recent memory as the enormous quantities of ‘people born after WW2’s start to understand the requirement for more continuous clinical mediation and long haul care. Interest in turning into a medical caretaker has disappeared as of late, presumably because of the historical bac

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.