We present an approach based on roles and access policies to improve security management of Web Applications. The approach first identifies the roles users have in the application, and then the software resources they can access based on the assigned role. Roles and resources are then used to design access policies by means of a visual language based tool providing a metaphor oriented layer above the well known Role Based Access Control (RBAC) model. A network infrastructure based on a Policy Enforcement Point (PEP) and a Policy Decision Point (PDP) is used to enforce these policies. The proposed approach has been used in a preliminary case study
Access control is often used to make restrictions to the resources in a system so that these resourc...
Role-based access policies model the users domain by means of complex structures where roles, which ...
International audienceModel driven security (MDS) is a well known approach in the access control dom...
We present an approach based on roles and access policies to improve security management of Web Appl...
The definition of security policies in information systems and programming applications is often acc...
The definition of security policies in information systems and programming applications is often acc...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012The web application...
Security is a key requirement in multi-user hypermedia systems, where the ability of different users...
Abstract-One of the most challenging problems in managing large web-applications is the complexity o...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Specifying the access policy of a web system is a relevant design concern that is often dismissed or...
The amount of Web applications used to replace existing traditional business applications has recent...
Access control is often used to make restrictions to the resources in a system so that these resourc...
Role-based access policies model the users domain by means of complex structures where roles, which ...
International audienceModel driven security (MDS) is a well known approach in the access control dom...
We present an approach based on roles and access policies to improve security management of Web Appl...
The definition of security policies in information systems and programming applications is often acc...
The definition of security policies in information systems and programming applications is often acc...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012The web application...
Security is a key requirement in multi-user hypermedia systems, where the ability of different users...
Abstract-One of the most challenging problems in managing large web-applications is the complexity o...
peer reviewedAccess control (AC) is an important security mechanism used in software systems to rest...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
Specifying the access policy of a web system is a relevant design concern that is often dismissed or...
The amount of Web applications used to replace existing traditional business applications has recent...
Access control is often used to make restrictions to the resources in a system so that these resourc...
Role-based access policies model the users domain by means of complex structures where roles, which ...
International audienceModel driven security (MDS) is a well known approach in the access control dom...