Skip to main content

Defining Access Control Rules with Conditions

  • Conference paper
Semantic Web Rules (RuleML 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6403))

  • 607 Accesses

Abstract

The Business Entity method is a new approach for declarative Business Process Modeling. An important aspect of this method is access control rules that determine what users can access what data under what conditions. This paper describes an extension of Semantics of Business Vocabulary and Business Rules (SBVR) for defining these access control rules. A tool supports the creation of these data access control rules by a combination of a matrix format and conditions given in SBVR Structured English. The rules are stored according to the SBVR metamodel, and may be visualized either as individual rules or in a matrix.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Prabir, N., et al.: Data4BPM Part 1: Introducing Business Entities and the Business Entity Definition Language (BEDL). IBM developerWorks, http://www.ibm.com/developerworks/websphere/library/techarticles/1004_nandi/1004_nandi.html

  2. Nigam, A., Caswell, N.S.: Business artifacts: An approach to operational specification. IBM Systems Journal 42(3), 428–445 (2003)

    Article  Google Scholar 

  3. Nandi, P., Kumaran, S.: Adaptive Business Object: A New Component Model for Business Integration. In: Proceedings of International Conference on Enterprise Information Systems, ICEIS (2005)

    Google Scholar 

  4. Kumaran, S.: Model Driven Enterprise. In: Proceedings of Global Integration Summit, Banff, Canada (2004)

    Google Scholar 

  5. Hull, R.: Artifact-centric Business Process Models: Brief Survey of Research Results and Challenges. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1152–1163. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Object Modeling Group (OMG): Business Process Modeling Notation Version 2.0 Beta 1, http://www.omg.org/spec/BPMN/2.0/

  7. Linehan, M.: SBVR Use Cases. In: Bassiliades, N., Governatori, G., Paschke, A. (eds.) RuleML 2008. LNCS, vol. 5321, pp. 128–196. Springer, Heidelberg (2008)

    Google Scholar 

  8. Linehan, M.: Ontologies and Rules in Business Models. In: Proceedings of the 2007 Eleventh International IEEE EDOC Conference Workshop, pp. 149–156 (2007)

    Google Scholar 

  9. InterNational Committee for Information Technology Standards, Information Technology - Role Based Access Control, ANSI/INCITS 359-2004 (2004), http://www.techstreet.com/standards/INCITS/359_2004?product_id=1151353

  10. National Institute of Standards and Technology (NIST), Role Based Access Control (RBAC)  and Role Based Security, http://csrc.nist.gov/groups/SNS/rbac/

  11. Object Modeling Group (OMG): Semantics of Business Vocabulary and Business Rules Specification, Version 1.0 (2007), http://www.omg.org/spec/SBVR/1.0/

  12. OASIS: eXtensible Access Control Markup Language (XACML), version 2.0 (2005), http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml

  13. OASIS: Core and hierarchical role based access control (RBAC) profile of XACML 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-spec-os.pdf

  14. Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM, New York (2009), http://portal.acm.org/citation.cfm?id=1542207.1542238&coll=ACM&dl=ACM&CFID=98850045&CFTOKEN=13091977

    Google Scholar 

  15. Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 39–52. Springer, Heidelberg (2007), http://www.econ.kuleuven.be/tew/academic/infosys/RESEARCH/PROLOGA/refsdtpubs/ProcessAwareRules.pdf

    Chapter  Google Scholar 

  16. Goedertier, S., Vanthienen, J.: EM-BrA2CE v0.2: A vocabulary and execution model for declarative business process modeling. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 496–501. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Vanthienen, J., Dries, E.: Illustration of a Decision Table Tool for Specifying and Implementing Knowledge Based Systems. In: Fifth International Conference on Tools with Artificial Intelligence (TAI), pp. 198–205 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Linehan, M.H. (2010). Defining Access Control Rules with Conditions. In: Dean, M., Hall, J., Rotolo, A., Tabet, S. (eds) Semantic Web Rules. RuleML 2010. Lecture Notes in Computer Science, vol 6403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16289-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16289-3_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16288-6

  • Online ISBN: 978-3-642-16289-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics