2005
DOI: 10.1007/978-3-540-30577-4_51
|View full text |Cite
|
Sign up to set email alerts
|

Representation of Extended RBAC Model Using UML Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…The entire procedure is performed in two stages: defining the permissions assigned to a function and providing the definitions of functions assigned to a particular role. [8] In an organization roles provided for various job functions. Specific roles assigned to perform certain operations.…”
Section: Role-based Access Control Modelmentioning
confidence: 99%
“…The entire procedure is performed in two stages: defining the permissions assigned to a function and providing the definitions of functions assigned to a particular role. [8] In an organization roles provided for various job functions. Specific roles assigned to perform certain operations.…”
Section: Role-based Access Control Modelmentioning
confidence: 99%
“…The user can take different roles on different occasions. -Extended RBAC (eRBAC) model [8,9]-each role realizes a specific task in the enterprise process and it contains many functions that the user can take. For each role it is possible to choose the necessary system functions.…”
Section: Access Control In Heterogeneous Information Systemsmentioning
confidence: 99%
“…5). The presentation of connections between the UML and the extended RBAC concepts is described widely in [8]:…”
Section: Concepts Of Extended Rbac Model Associated With Uml Conceptsmentioning
confidence: 99%
“…Role-Based Access Control (RBAC) [15,16] or its extensions [17] require the identification of roles in a system. The role is viewed as a structure around which the access control policy is formulated.…”
Section: Role Concept and Usage Concept In Access Controlmentioning
confidence: 99%
“…This approach was based on two access control models: extended RBAC model [17] and UCON model [18,19].…”
Section: Approach Of Role Based Access Control With Concept Of Usage mentioning
confidence: 99%