DocumentCode
3614645
Title
Specification and verification of constraints in role based access control
Author
G. Kolaczek
Author_Institution
Wroclaw Univ. of Technol., Poland
fYear
2003
fDate
6/25/1905 12:00:00 AM
Firstpage
190
Lastpage
195
Abstract
The paper presents a short overview of the foundations of the role-based access control modal and its properties. In particular, the problem of definition and verification of various types of constraints is analysed. The main benefit of the presented model is that it is based on the fundamental notions of both enterprise management and information systems access control. The other important value of the model is the possibility of automation of processes and implementation of mechanisms related to access control on the basis of logical automated reasoning and the PROLOG programming language.
Keywords
"Access control","Security","Automation","Logic","Paper technology","Information management","Management information systems","Computer languages","Protection","Automatic control"
Publisher
ieee
Conference_Titel
Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on
ISSN
1080-1383
Print_ISBN
0-7695-1963-6
Type
conf
DOI
10.1109/ENABL.2003.1231406
Filename
1231406
Link To Document