Role slices: A notation for RBAC permission assignment and enforcement

9Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

During the past decade, there has been an explosion in the complexity of software applications, with an increasing emphasis on software design via model-driven architectures, patterns, and models such as the unified modeling language (UML). Despite this, the integration of security concerns throughout the product life cycle has lagged, resulting in software infrastructures that are untrustworthy in terms of their ability to authenticate users and to limit them to their authorized application privileges. To address this issue, we present an approach to integrate role-based access control (RBAC) into UML at design-time for permission assignment and enforcement. Specifically, we introduce a new UML artifact, the role slice, supported via a new UML role-slice diagram, to capture RBAC privileges at design time within UML. Once captured, we demonstrate the utilization of aspect-oriented programming (AOP) techniques for the automatic generation of security enforcement code. Overall, we believe that our approach is an important step to upgrading security to be an indispensable part of the software process. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Pavlich-Mariscal, J. A., Doan, T., Michel, L., Demurjian, S. A., & Ting, T. C. (2005). Role slices: A notation for RBAC permission assignment and enforcement. In Lecture Notes in Computer Science (Vol. 3654, pp. 40–53). Springer Verlag. https://doi.org/10.1007/11535706_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free