Specifying the access policy of a web system is a relevant design concern that is often dismissed or postponed until the implementation. ADM-RBAC (Ariadne Development Method with Role-Based Access Control) is a model-driven approach for web systems that supports the specification of access control policies in an integrated way and at two abstraction levels. At the conceptual level a number of visual models specify the access policy in a way that is similar to the users' point of view. At the detailed level, models are oriented towards providing enough details to generate prototypes in an automatic or semiautomatic way. In this paper we describe the visual models of ADM-RBAC and their empirical evaluation. © 2008 IEEE
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Role-Based Access Control (RBAC) usually enables a higher level view of authorization. In this model...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
Specifying the access policy of a web system is a relevant design concern that is often dismissed or...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present an approach based on roles and access policies to improve security management of Web Appl...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
The definition of security policies in information systems and programming applications is often acc...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The definition of security policies in information systems and programming applications is often acc...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
The Access Matrix is a useful model for understanding the behaviour and properties of access control...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Role-based Access Control (RBAC) models are access policies that associate access rights to roles of...
Role-based Access Control (RBAC) models are access policies that associate access rights to roles of...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Role-Based Access Control (RBAC) usually enables a higher level view of authorization. In this model...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
Specifying the access policy of a web system is a relevant design concern that is often dismissed or...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present an approach based on roles and access policies to improve security management of Web Appl...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
The definition of security policies in information systems and programming applications is often acc...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The definition of security policies in information systems and programming applications is often acc...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
The Access Matrix is a useful model for understanding the behaviour and properties of access control...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Role-based Access Control (RBAC) models are access policies that associate access rights to roles of...
Role-based Access Control (RBAC) models are access policies that associate access rights to roles of...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Role-Based Access Control (RBAC) usually enables a higher level view of authorization. In this model...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...