Abstract
This paper presents an extension of the standard role-based access control (RBAC) model together with its representation using the Unified Modeling Language (UML). The presented model is developed for the role engineering in the security of information system.
The presented implementation of the RBAC model consists in role creation via defining appropriate permissions. The entire procedure is performed in two stages: defining the permissions assigned to a function and providing the definitions of functions assigned to a particular role.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.B.: Role-Based Access Control Models. IEEE Computer (1996)
Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access control. ACM TISSEC 4(3) (2001)
OMG Unified Modeling Language Specification. OMG, Reference Manual (2003)
Goncalves, G., Hemery, F., Poniszewska, A.: Verification of Access Control Coherence in Information System during Modifications. In: 12th IEEE WETICE, Austria (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poniszewska-Maranda, A., Goncalves, G., Hemery, F. (2005). Representation of Extended RBAC Model Using UML Language. In: Vojtáš, P., Bieliková, M., Charron-Bost, B., Sýkora, O. (eds) SOFSEM 2005: Theory and Practice of Computer Science. SOFSEM 2005. Lecture Notes in Computer Science, vol 3381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30577-4_51
Download citation
DOI: https://doi.org/10.1007/978-3-540-30577-4_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24302-1
Online ISBN: 978-3-540-30577-4
eBook Packages: Computer ScienceComputer Science (R0)