Strembeck, 2005 - Google Patents
A role engineering tool for role-based access controlStrembeck, 2005
View PDF- Document ID
- 520016034195918266
- Author
- Strembeck M
- Publication year
- Publication venue
- Proc. of the 3rd Symposium on requirements engineering for information security (SREIS)
External Links
Snippet
Like every requirements engineering process, the process of role engineering for role-based access control depends significantly on human factors. For this reason, many elements of the process cannot be automated (or at most partially). Nevertheless, tool support is …
- 238000000034 method 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
- G06Q10/06316—Sequencing of tasks or work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/22—Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Davulcu et al. | Modeling and analysis of interactions in virtual enterprises | |
US8244777B1 (en) | Model driven compliance management system and method | |
Lu et al. | Using a temporal constraint network for business process execution | |
US20090144703A1 (en) | Method and system for versioning a software system | |
Buschle et al. | A tool for enterprise architecture analysis using the PRM formalism | |
US9558296B2 (en) | Method for processing a graph containing a set of nodes | |
US20070174106A1 (en) | Method for reducing implementation time for policy based systems management tools | |
US8126692B2 (en) | Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology | |
Cherfa et al. | Systems of systems: From mission definition to architecture description | |
US20090183021A1 (en) | Method and system for modeling, validating and automatically resolving goals and dependencies between elements within a topology | |
Li et al. | Integrating security patterns with security requirements analysis using contextual goal models | |
Strembeck | A role engineering tool for role-based access control | |
Mendonca et al. | A process-centric approach for coordinating product configuration decisions | |
Geepalla et al. | Spatio-temporal role based access control for physical access control systems | |
Cheong et al. | Frame-based method for customizing generic software architectures | |
Skandhakumar et al. | Physical access control administration using building information models | |
Xu et al. | Automated security-focused network configuration management: State of the art, challenges, and future directions | |
Qamar et al. | Evaluating RBAC supported techniques and their validation and verification | |
Rakkay et al. | Security analysis of role based access control models using colored petri nets and cpntools | |
Weinreich et al. | Integrating requirements and design decisions in architecture representation | |
Rodríguez-Lera et al. | Traceability and accountability in autonomous agents | |
Deng et al. | Modeling and Simulation of CPS based on SysML and Modelica (KG) | |
Eilam et al. | Model-based automation of service deployment in a constrained environment | |
Lima Reis et al. | A policy-based resource instantiation mechanism to automate software process management | |
Lúcio et al. | Verifying access control in statecharts |