Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies - SACMAT '02 2002
DOI: 10.1145/507716.507717
|View full text |Cite
|
Sign up to set email alerts
|

A scenario-driven role engineering process for functional RBAC roles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0
6

Year Published

2004
2004
2015
2015

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 45 publications
(57 citation statements)
references
References 0 publications
0
51
0
6
Order By: Relevance
“…We have chosen to use the language model driven variant of our process because the RBAC DSL is placed in a domain well known to the developers (see, e.g., [46,47,62,63,64,65]). Therefore, it was sensible for us to start with a conceptual language model which can be incrementally refined as the DSL evolves.…”
Section: Defining the Dsl's Core Language Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…We have chosen to use the language model driven variant of our process because the RBAC DSL is placed in a domain well known to the developers (see, e.g., [46,47,62,63,64,65]). Therefore, it was sensible for us to start with a conceptual language model which can be incrementally refined as the DSL evolves.…”
Section: Defining the Dsl's Core Language Modelmentioning
confidence: 99%
“…A role is an abstract entity which represents a certain type of subject in terms of the permissions granted to this type of subject. When modeled to represent human users, roles most often reflect the work profiles of a certain organization (see [47,63]). In its basic form, a permission consists of an operation, object tuple.…”
Section: Defining the Dsl's Core Language Modelmentioning
confidence: 99%
“…The alignment of privacy artifacts can be established only using a requirements engineering methodology able to capture all the aspects demanded by privacy and data protection policies. There is evidence in the literature that Requirements Engineering can support the specification of privacy policies [51] as well as of data protection policies [52] and, in general, access control policies [80,95]. However, their drawbacks are mainly due to the underlying requirements engineering methodology.…”
Section: Privacy Alignment and Compliance Discussionmentioning
confidence: 99%
“…Neumann et al [95] proposed a scenario-driven role engineering process for defining RBAC policies. This process starts by identifying usage scenarios where actions and events are seen as steps.…”
Section: Aligning Enterprise Goals and Data Protection Policiesmentioning
confidence: 99%
“…Many other authors sought to leverage business information to design roles by adopting a topdown approach such as [16,17]. These works represent pure top-down approachesthey do not consider existing access permissions.…”
Section: Related Workmentioning
confidence: 99%