Persistent Link:
http://hdl.handle.net/10150/105917
Title:
A Methodology for Managing Roles in Legacy Systems
Editors:
Osborn, Sylvia; Han, Yan; Liu, Jun
Citation:
A Methodology for Managing Roles in Legacy Systems 2003,
Issue Date:
2003
URI:
http://hdl.handle.net/10150/105917
Submitted date:
2007-04-04
Abstract:
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. Much of the research on RBAC has been done in an environment isolated from real systems which need to be managed. In this paper, we propose a methodology for using an RBAC design tool we have developed, to manage and effect changes to an underlying relational database. We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph.
Type:
Proceedings
Language:
en
Keywords:
Databases; XML; Computer Science
Local subject classification:
Security and protection: access controls; Role-based access control; Relational databases

Full metadata record

DC FieldValue Language
dc.contributor.editorOsborn, Sylviaen_US
dc.contributor.editorHan, Yanen_US
dc.contributor.editorLiu, Junen_US
dc.date.accessioned2007-04-04T00:00:01Z-
dc.date.available2010-06-18T23:36:39Z-
dc.date.issued2003en_US
dc.date.submitted2007-04-04en_US
dc.identifier.citationA Methodology for Managing Roles in Legacy Systems 2003,en_US
dc.identifier.urihttp://hdl.handle.net/10150/105917-
dc.description.abstractRole-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. Much of the research on RBAC has been done in an environment isolated from real systems which need to be managed. In this paper, we propose a methodology for using an RBAC design tool we have developed, to manage and effect changes to an underlying relational database. We also discuss how to simulate the role graph model on a Unix system, and extend the methodology just described for relational databases to managing a Unix system when changes are made to the role graph.en_US
dc.format.mimetypeapplication/pdfen_US
dc.language.isoenen_US
dc.subjectDatabasesen_US
dc.subjectXMLen_US
dc.subjectComputer Scienceen_US
dc.subject.otherSecurity and protection: access controlsen_US
dc.subject.otherRole-based access controlen_US
dc.subject.otherRelational databasesen_US
dc.titleA Methodology for Managing Roles in Legacy Systemsen_US
dc.typeProceedingsen_US
All Items in UA Campus Repository are protected by copyright, with all rights reserved, unless otherwise indicated.