Modeling role-based access control using a relational database tool

被引:0
|
作者
Chiang, Chia-Chu [1 ]
Bayrak, Coskun [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, Little Rock, AR 72204 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional access control schemes have certain inherent weaknesses. As a promising alternative to traditional access control schemes, role-based access control has received special attention for its unique flexibility. In this paper, we use a database tool called WinRDBI to study the behavior of a role-based access control model. A detailed discussion of the role-based access control behaviors and policies is then presented.
引用
收藏
页码:7 / 10
页数:4
相关论文
共 50 条
  • [1] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
    Wang, Man
    Mayo, Jean
    Shene, Ching-Kuang
    Lake, Thomas
    Carr, Steve
    Wang, Chaoli
    [J]. ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
  • [2] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [3] On the interaction between role-based access control and relational databases
    Osborn, SL
    Reid, LK
    Wesson, GJ
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 275 - 287
  • [4] Modeling role-based access control using parameterized UML models
    Kim, DK
    Ray, I
    France, R
    Li, N
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2004, 2984 : 180 - 193
  • [5] Role-based access control for grid database services using the community authorization service
    Pereira, AL
    Muppavarapu, V
    Chung, SM
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 156 - 166
  • [6] Modeling of the role-based access control policy with constraints using description logic
    Chae, Junghwa
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 500 - 511
  • [7] Modeling and inferring on role-based access control policies using data dependencies
    Thion, Romuald
    Coulondre, Stephane
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 914 - 923
  • [8] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [9] Contextual and Relational Role-Based Modeling Framework
    Kuehn, Thomas
    Werner, Christopher
    Schoen, Hendrik
    Zhao Zhenxi
    Assmann, Uwe
    [J]. 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 442 - 449
  • [10] A Verifiable Modeling Approach to Configurable Role-Based Access Control
    Kim, Dae-Kyoo
    Lu, Lunjin
    Kim, Sangsig
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2010, 6013 : 188 - 202