Applying Model Driven Architecture approach to Model Role Based Access Control System
نویسنده
چکیده
................................................................................................................................... ii Acknowledgements ................................................................................................................. iii Table of
منابع مشابه
Model Driven Architecture for Modeling of Logical Security Based on RBAC Approach
This paper presents an approach of role-based access control (RBAC) for information systems with the use of MDA (Model Driven Architecture). The main purpose is to join the concepts of MDA approach with the concepts of access control models, in particular with the concepts of access control based on roles and on usage concept. To reach this objectives the appropriate solution was created to mod...
متن کاملTwo-step Role-Based Access Control method for Ontology Storage
Because of the advance of ontology technology and the explosion of web ontology, ontology repository has become a necessity. As the information security issue, research for adapting access control to the ontology storage has been studied, and there are two approaches which are model-driven approach and query rewriting approach. To solve the problems which these approaches have, this paper propo...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملRecovering Role-Based Access Control Security Models from Dynamic Web Applications
Security of dynamic web applications is a serious issue. While Model Driven Architecture (MDA) techniques can be used to generate applications with given access control security properties, analysis of existing web applications is more problematic. In this paper we present a model transformation technique to automatically construct a role-based access control (RBAC) security model of dynamic we...
متن کاملReal World Modeling and Nonlinear Control of an Electrohydraulic Driven Clutch
In this paper, a complete model of an electro hydraulic driven dry clutch along with its performance evaluation has elucidated. Through precision modeling, a complete nonlinear physical and full order sketch of clutch has drawn. Ultimate nonlinearities existent in the system prohibits it from being controlled by conventional linear control algorithms and to compensate the behavior of the sy...
متن کامل