[go: up one dir, main page]

Strembeck, 2005 - Google Patents

A role engineering tool for role-based access control

Strembeck, 2005

View PDF
Document ID
520016034195918266
Author
Strembeck M
Publication year
Publication venue
Proc. of the 3rd Symposium on requirements engineering for information security (SREIS)

External Links

Snippet

Like every requirements engineering process, the process of role engineering for role-based access control depends significantly on human factors. For this reason, many elements of the process cannot be automated (or at most partially). Nevertheless, tool support is …
Continue reading at wi.wu.ac.at (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0631Resource planning, allocation or scheduling for a business operation
    • G06Q10/06316Sequencing of tasks or work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/22Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]

Similar Documents

Publication Publication Date Title
Davulcu et al. Modeling and analysis of interactions in virtual enterprises
US8244777B1 (en) Model driven compliance management system and method
Lu et al. Using a temporal constraint network for business process execution
US20090144703A1 (en) Method and system for versioning a software system
Buschle et al. A tool for enterprise architecture analysis using the PRM formalism
US9558296B2 (en) Method for processing a graph containing a set of nodes
US20070174106A1 (en) Method for reducing implementation time for policy based systems management tools
US8126692B2 (en) Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology
Cherfa et al. Systems of systems: From mission definition to architecture description
US20090183021A1 (en) Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology
Li et al. Integrating security patterns with security requirements analysis using contextual goal models
Strembeck A role engineering tool for role-based access control
Mendonca et al. A process-centric approach for coordinating product configuration decisions
Geepalla et al. Spatio-temporal role based access control for physical access control systems
Cheong et al. Frame-based method for customizing generic software architectures
Skandhakumar et al. Physical access control administration using building information models
Xu et al. Automated security-focused network configuration management: State of the art, challenges, and future directions
Qamar et al. Evaluating RBAC supported techniques and their validation and verification
Rakkay et al. Security analysis of role based access control models using colored petri nets and cpntools
Weinreich et al. Integrating requirements and design decisions in architecture representation
Rodríguez-Lera et al. Traceability and accountability in autonomous agents
Deng et al. Modeling and Simulation of CPS based on SysML and Modelica (KG)
Eilam et al. Model-based automation of service deployment in a constrained environment
Lima Reis et al. A policy-based resource instantiation mechanism to automate software process management
Lúcio et al. Verifying access control in statecharts