Many systems that host groups of users, like social media platforms, provide solutions or tools for users and groups of users. Within these groups, there can exist roles, which again might be connected to permissions. The role model itself can vary from system to system. Some are hierarchical, some have flat hierarchies, some are related to the permissions, others with notifications. Decoupling the role model implementation from the rest of the system has multiple advantages, such as achieving automatic role assignment more easily and being able to change a role model on the fly. Within this master thesis, challenges of automated role assignment are examined and necessary elements for how a development tool can help are distilled. The main ...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
Since the year 1977, role modeling has been continuously investigated as promising paradigm to model...
Networked collaborative virtual environment (NCVE) allows users from diverse locations to work toget...
Many systems that host groups of users, like social media platforms, provide solutions or tools for ...
The computing community is making significant efforts towards the development of automatic approache...
Role-based modeling has been proposed in 1977 by Charles W. Bachman, as a means to model complex and...
Personas are short profiles of fictional but realistic individuals that we use to describe particula...
The role generic relationship for conceptual modeling relates a class of objects (e.g., persons) and...
In large organizations with tens of thousands of employees, managing individual people\u27s permissi...
Nowadays, social software is in demand in very different settings. Managing relationships (e.g., soc...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
It is generally agreed upon the fact that the quality of Identity- and Access Management (IAM) data ...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
The development of Agent Oriented Software Engineering (AOSE) and the use of roles within AOSE have ...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
Since the year 1977, role modeling has been continuously investigated as promising paradigm to model...
Networked collaborative virtual environment (NCVE) allows users from diverse locations to work toget...
Many systems that host groups of users, like social media platforms, provide solutions or tools for ...
The computing community is making significant efforts towards the development of automatic approache...
Role-based modeling has been proposed in 1977 by Charles W. Bachman, as a means to model complex and...
Personas are short profiles of fictional but realistic individuals that we use to describe particula...
The role generic relationship for conceptual modeling relates a class of objects (e.g., persons) and...
In large organizations with tens of thousands of employees, managing individual people\u27s permissi...
Nowadays, social software is in demand in very different settings. Managing relationships (e.g., soc...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
It is generally agreed upon the fact that the quality of Identity- and Access Management (IAM) data ...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
The development of Agent Oriented Software Engineering (AOSE) and the use of roles within AOSE have ...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
Since the year 1977, role modeling has been continuously investigated as promising paradigm to model...
Networked collaborative virtual environment (NCVE) allows users from diverse locations to work toget...