• DocumentCode
    3614645
  • Title

    Specification and verification of constraints in role based access control

  • Author

    G. Kolaczek

  • Author_Institution
    Wroclaw Univ. of Technol., Poland
  • fYear
    2003
  • fDate
    6/25/1905 12:00:00 AM
  • Firstpage
    190
  • Lastpage
    195
  • Abstract
    The paper presents a short overview of the foundations of the role-based access control modal and its properties. In particular, the problem of definition and verification of various types of constraints is analysed. The main benefit of the presented model is that it is based on the fundamental notions of both enterprise management and information systems access control. The other important value of the model is the possibility of automation of processes and implementation of mechanisms related to access control on the basis of logical automated reasoning and the PROLOG programming language.
  • Keywords
    "Access control","Security","Automation","Logic","Paper technology","Information management","Management information systems","Computer languages","Protection","Automatic control"
  • Publisher
    ieee
  • Conference_Titel
    Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on
  • ISSN
    1080-1383
  • Print_ISBN
    0-7695-1963-6
  • Type

    conf

  • DOI
    10.1109/ENABL.2003.1231406
  • Filename
    1231406