PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The implementation of the RBAC model of the UML-Java platform

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The role-based access control (RBAC) model is one of the policies used to access control in the information systems. This powerful technology is very useful for managing the security of the information systems of the enterprises. In order to utilise its potential, the roles - the main component of this model - have to be properly constructed to reflect the organisational access control policy and the needs of the system. This requires the development of the components of the RBAC model in the correct way and implementation with the use of suitable tools. This paper presents the extension of the standard RBAC model and the implementation of this extension. The proposed approach is realised using the Unified Modelling Language (UML). The UML language was chosen because nowadays it is the standard tool, properly reflecting the description of the information system and its needs.
Rocznik
Strony
53--67
Opis fizyczny
Bibliogr. 6 poz.
Twórcy
  • Technical University of Łódź, Institute of Computer Science, Poland
autor
  • Université d’Artois, Bethune, France
autor
  • Université d’Artois, Bethune, France
Bibliografia
  • [1] R. S. Sandhu; “Role hierarchies and Constraints for Lattice-Based Access Control”, Proc. Fourth European Symposium on Research in Computer Security, Rome, Italy, 1996,
  • [2] R. S. Sandhu, P. Samarati; “Authentication, Access Control and Intrusion Detection”, The Computer Science and Engineering hand-book, 1997,
  • [3] R. S. Sandhu, P. Samarati; “Access Control; Principles and Practice”, IEEE Communication, 1994,
  • [4] R. S. Sandhu, Q. Munawer; “How to do Discretionary Access Control Using Roles”, Proceeding of 3rd ACM Workshop on Role-Based Access Control, Fairfax, 1998,
  • [5] G. Goncalves, F. Hemery; “From use case of UML to user profile of management information system”, 2000,
  • [6] S. Castro, M. G. Fugini, G. Martella, P. Samarati; “Database Security”, Addison- Wesley, 1994.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-LOD7-0028-0036
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.