Part 1: ConferenceInternational audienceThis paper presents an extension of role-based access control model with the use of usage control concept together with its representation using the Unified Modeling Language (UML). The presented model is developed for role engineering in the security of information system. The presented implementation of URBAC (Usage Role-Based Access Control) model consists in creation of security profiles for the users of information system
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
It has been argued that security perspectives, of which access control is one, should be taken into ...
It has been argued that security perspectives, of which access control is one, should be taken into ...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
Role based access control (RBAC) is a promising technology for scalable access control. For RBAC to ...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Since the value of information is constantly growing more and more businesses are in need for inform...
Prohibiting unauthorized access to critical resources and data has become a major requirement for en...
This paper presents an approach of role-based access control (RBAC) for information systems with the...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
Role-based access control is a widely-used mechanism in computer systems – it ensures security by re...
Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorize...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Security requirements have become an integral part of most modern software systems. In order to prod...
Security for software applications involves defining what needs to be protected (security policy), a...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
It has been argued that security perspectives, of which access control is one, should be taken into ...
It has been argued that security perspectives, of which access control is one, should be taken into ...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
Role based access control (RBAC) is a promising technology for scalable access control. For RBAC to ...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Since the value of information is constantly growing more and more businesses are in need for inform...
Prohibiting unauthorized access to critical resources and data has become a major requirement for en...
This paper presents an approach of role-based access control (RBAC) for information systems with the...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
Role-based access control is a widely-used mechanism in computer systems – it ensures security by re...
Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorize...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Security requirements have become an integral part of most modern software systems. In order to prod...
Security for software applications involves defining what needs to be protected (security policy), a...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
It has been argued that security perspectives, of which access control is one, should be taken into ...
It has been argued that security perspectives, of which access control is one, should be taken into ...