2013
DOI: 10.2478/bpasts-2013-0058
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and design of role engineering in development of access control for dynamic information systems

Abstract: Abstract. Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The cases affirm how perspective roles can change over the service's life cycle [1,5,30,42]. In the case of My Citizen Profile the roles shifted as the phases of the service progressed from piloting to operationalization/expansion and as new public service providers (who integrate particular services or deliver particular citizen data to the application) became involved.…”
Section: Discussionmentioning
confidence: 89%
See 1 more Smart Citation
“…The cases affirm how perspective roles can change over the service's life cycle [1,5,30,42]. In the case of My Citizen Profile the roles shifted as the phases of the service progressed from piloting to operationalization/expansion and as new public service providers (who integrate particular services or deliver particular citizen data to the application) became involved.…”
Section: Discussionmentioning
confidence: 89%
“…In an enterprise architecture approach, roles comprise the responsibilities undertaken in different process steps and a role model describing the roles in a service can be seen as complementary to a service's process and data models [7]. Poniszewska-Marańda [30] highlights the complexity of identifying and organizing roles, especially in settings where roles are not very formalized, such as within organizations. Regarding access control models, the author represents roles as a set of functions, i.e., actions actors can undertake to achieve the responsibilities they are assigned to.…”
Section: 2mentioning
confidence: 99%
“…This principle recommends that only the needed resources or permissions should be granted [ 5 ]. Using Role-Based Access Control (RBAC) to manage access to a cluster [ 5 , 34 , 35 ]. Ensuring security keys management and exchange by implementing for example automated key rotation.…”
Section: Production Deployment Requirements—background and Relatedmentioning
confidence: 99%
“…discrete-event models) [43]. However, the open aspect of the learning-teaching process has features that demands carefully selected modelling approach.…”
Section: Formulating the Integrated Repository Filling Modelmentioning
confidence: 99%