Security is a key requirement in multi-user hypermedia systems, where the ability of different users to access and manipulate the information depend on their needs and responsibilities. If security policies are specified in terms of individual users and low-level abstractions not related to the hypermedia domain, security administration becomes complex and prone to error. This paper describes how an RBAC (Role Based Access Control) module is integrated into a web server that is treated as a hypermedia system instead of as a set of files, programs and network protocols. This implies the definition of a set of hypermedia related operations that authorised roles can execute on the system objects
Abstract-One of the most challenging problems in managing large web-applications is the complexity o...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
In order for intranets to reach their full potential, access control and authorization management me...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
International audienceThe majority of today's web-based applications are based on back-end databases...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The amount of Web applications used to replace existing traditional business applications has recent...
We present an approach based on roles and access policies to improve security management of Web Appl...
Current approaches to access control on Web servers do not scale to enterprise-wide systems, since t...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
More and more the engineering of complex agent-based systems calls for infrastructural support for c...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
Abstract-One of the most challenging problems in managing large web-applications is the complexity o...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
In order for intranets to reach their full potential, access control and authorization management me...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
International audienceThe majority of today's web-based applications are based on back-end databases...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The amount of Web applications used to replace existing traditional business applications has recent...
We present an approach based on roles and access policies to improve security management of Web Appl...
Current approaches to access control on Web servers do not scale to enterprise-wide systems, since t...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
More and more the engineering of complex agent-based systems calls for infrastructural support for c...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
Abstract-One of the most challenging problems in managing large web-applications is the complexity o...
Role Based Access Control (RBAC) [6] is a popular approach to specify and enforce security policies ...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...