메뉴 건너뛰기




Volumn 81, Issue 8, 2008, Pages 1306-1326

Role engineering: From design to evolution of security schemes

Author keywords

Access control; Constraints; Role engineering; Role based access control model; Security of information system; UML (Unified Modelling Language)

Indexed keywords

INFORMATION SCIENCE; INFORMATION SYSTEMS; PUBLIC POLICY; SECURITY SYSTEMS; TECHNOLOGY;

EID: 50049104179     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2007.11.003     Document Type: Article
Times cited : (20)

References (62)
  • 1
    • 50049120244 scopus 로고    scopus 로고
    • Ahad, R. et al., 1992. Supporting access control in an object-oriented database language. In: Proceedings of the 3rd International Conference Extending Database Technology.
    • Ahad, R. et al., 1992. Supporting access control in an object-oriented database language. In: Proceedings of the 3rd International Conference Extending Database Technology.
  • 2
    • 50049110543 scopus 로고    scopus 로고
    • Ahn, G.-J., 1999. The RCL 2000 language for specifying role-based authorization constraints. PhD thesis, George Mason University, USA.
    • Ahn, G.-J., 1999. The RCL 2000 language for specifying role-based authorization constraints. PhD thesis, George Mason University, USA.
  • 3
    • 85031151129 scopus 로고    scopus 로고
    • The RSL99 language for role-based separation of duty constraints
    • Ahn G.-J., and Sandhu R.S. The RSL99 language for role-based separation of duty constraints. ACM Transactions on RBAC (1999)
    • (1999) ACM Transactions on RBAC
    • Ahn, G.-J.1    Sandhu, R.S.2
  • 5
    • 50049135925 scopus 로고    scopus 로고
    • ANSI INCITS 359-2004, American national standard for information technology, role based access control, http://csrc.nist.gov/rbac, 2004.
    • ANSI INCITS 359-2004, American national standard for information technology, role based access control, http://csrc.nist.gov/rbac, 2004.
  • 6
    • 50049103130 scopus 로고    scopus 로고
    • Bell, D.E., La Padula, L.J., 1975. Secure computer system: unified exposition and multi interpretation. Technical Report MTIS ADA023588, MITRE Corporation.
    • Bell, D.E., La Padula, L.J., 1975. Secure computer system: unified exposition and multi interpretation. Technical Report MTIS ADA023588, MITRE Corporation.
  • 7
    • 50049121044 scopus 로고    scopus 로고
    • Bertino, E., Ferrari, E., Atluri, V. November 1997. A flexible model for the specification and enforcement of authorization constraints in workflow management system. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control.
    • Bertino, E., Ferrari, E., Atluri, V. November 1997. A flexible model for the specification and enforcement of authorization constraints in workflow management system. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control.
  • 8
    • 50049100631 scopus 로고    scopus 로고
    • Bertino, E., Bonatti, P.A., Ferrari, E., August 2001. TRBAC: a temporal role-based access control model, A3.
    • Bertino, E., Bonatti, P.A., Ferrari, E., August 2001. TRBAC: a temporal role-based access control model, A3.
  • 9
    • 0031341651 scopus 로고    scopus 로고
    • Bhamidipati, V., Sandhu, R.S., 1997. The ARBAC97 model for role-based administration of roles. In: Proceedings of the 2nd ACM Workshop on Role-Based Access.
    • Bhamidipati, V., Sandhu, R.S., 1997. The ARBAC97 model for role-based administration of roles. In: Proceedings of the 2nd ACM Workshop on Role-Based Access.
  • 11
    • 50049132868 scopus 로고    scopus 로고
    • Casati, F., Castano, S., Fugini, M., 2001. Managing workflow authorization constraints through active technology. HP Labs Technical Reports HPL-2000-156 20001206 External.
    • Casati, F., Castano, S., Fugini, M., 2001. Managing workflow authorization constraints through active technology. HP Labs Technical Reports HPL-2000-156 20001206 External.
  • 13
    • 50049126637 scopus 로고    scopus 로고
    • Chappelet, J.-L., Snella, J.-J., 1997. Language for organization, Ossad approach (Un langage pour l'organisation, L'approche Ossad), Presses Polytechniques et Universitaires Romandes.
    • Chappelet, J.-L., Snella, J.-J., 1997. Language for organization, Ossad approach (Un langage pour l'organisation, L'approche Ossad), Presses Polytechniques et Universitaires Romandes.
  • 14
    • 0029425954 scopus 로고    scopus 로고
    • Chen, F., Sandhu, R.S., 1995. Constraints for role-based access control. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control.
    • Chen, F., Sandhu, R.S., 1995. Constraints for role-based access control. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control.
  • 15
    • 0031599869 scopus 로고    scopus 로고
    • Coulourisand, G., Dollimore, J., Roberts, M., 1998. Role and task-based access control in the PerDiS groupware platform. In: Proceedings of the ACM Workshop on Role-Based Access Control.
    • Coulourisand, G., Dollimore, J., Roberts, M., 1998. Role and task-based access control in the PerDiS groupware platform. In: Proceedings of the ACM Workshop on Role-Based Access Control.
  • 16
    • 50049136199 scopus 로고    scopus 로고
    • Coyne, E.J., 1996. Role engineering. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control (RBAC96), USA.
    • Coyne, E.J., 1996. Role engineering. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control (RBAC96), USA.
  • 17
    • 50049083235 scopus 로고    scopus 로고
    • Crook, R., Ince, D., Nuseibeh, B., 2002. Towards an analytical role modelling framework for security requirements. In: Proceedings of the 8th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ02), Germany.
    • Crook, R., Ince, D., Nuseibeh, B., 2002. Towards an analytical role modelling framework for security requirements. In: Proceedings of the 8th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ02), Germany.
  • 18
    • 84944754330 scopus 로고    scopus 로고
    • Cuppens, F., Miege, A., 2003. Modelling contexts in the Or-BAC model. In: Proceedings of the 19th Annual Computer Security Applications Conference, USA.
    • Cuppens, F., Miege, A., 2003. Modelling contexts in the Or-BAC model. In: Proceedings of the 19th Annual Computer Security Applications Conference, USA.
  • 19
    • 77952407814 scopus 로고    scopus 로고
    • El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G., 2003. Organization based access control. In: Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Italy.
    • El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G., 2003. Organization based access control. In: Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Italy.
  • 20
    • 50049087223 scopus 로고    scopus 로고
    • Epstein, P., Sandhu, R.S., 1999. Towards a UML based approach to role engineering. In: Proceedings of the 4th ACM Workshop on Role-Based Access Control, USA.
    • Epstein, P., Sandhu, R.S., 1999. Towards a UML based approach to role engineering. In: Proceedings of the 4th ACM Workshop on Role-Based Access Control, USA.
  • 21
    • 84949220539 scopus 로고    scopus 로고
    • Epstein, P., Sandhu, R.S., 2001. Engineering of role/permission assignments. In: Proceedings of the 17th Annual Computer Security Applications Conference, USA.
    • Epstein, P., Sandhu, R.S., 2001. Engineering of role/permission assignments. In: Proceedings of the 17th Annual Computer Security Applications Conference, USA.
  • 22
    • 0031363895 scopus 로고    scopus 로고
    • Fernandez, E.B., Hawkins, J.C., 1997. Determining role rights from use cases. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control.
    • Fernandez, E.B., Hawkins, J.C., 1997. Determining role rights from use cases. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control.
  • 23
    • 50049086641 scopus 로고    scopus 로고
    • Ferraiolo, D., Kuhn, D.K., 1992. Role based access control. In: Proceedings of the 15th National Computer Security Conference, NIST/NSA.
    • Ferraiolo, D., Kuhn, D.K., 1992. Role based access control. In: Proceedings of the 15th National Computer Security Conference, NIST/NSA.
  • 25
    • 50049099402 scopus 로고    scopus 로고
    • Gabay, J., 1998. Merise to OMT and UML, InterEditions.
    • Gabay, J., 1998. Merise to OMT and UML, InterEditions.
  • 26
    • 0031611731 scopus 로고    scopus 로고
    • Gavrila, S.I., Barkley, J.F., 1998. Formal specification for role based access control user/role and role/role relationship management. In: Proceedings of the ACM Workshop on Role-Based Access Control.
    • Gavrila, S.I., Barkley, J.F., 1998. Formal specification for role based access control user/role and role/role relationship management. In: Proceedings of the ACM Workshop on Role-Based Access Control.
  • 27
    • 0035790754 scopus 로고    scopus 로고
    • Georgiadis, Ch.K., Mavridis, I., Pangalos, G., Thomas, R.K., 2001. Flexible team-based access control using contexts. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001).
    • Georgiadis, Ch.K., Mavridis, I., Pangalos, G., Thomas, R.K., 2001. Flexible team-based access control using contexts. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001).
  • 28
    • 50049101438 scopus 로고    scopus 로고
    • Goncalves, G., Hemery, F., 2000. From use case in UML to management of roles in information systems. In: Proceedings of the Conference Inforsid, France.
    • Goncalves, G., Hemery, F., 2000. From use case in UML to management of roles in information systems. In: Proceedings of the Conference Inforsid, France.
  • 29
    • 50049090029 scopus 로고    scopus 로고
    • Goncalves, G., Hemery, F., 2001. UML-XML platform for management of roles in information system. In: Proceedings of the Conference Inforsid.
    • Goncalves, G., Hemery, F., 2001. UML-XML platform for management of roles in information system. In: Proceedings of the Conference Inforsid.
  • 30
    • 84944412066 scopus 로고    scopus 로고
    • Goncalves, G., Hemery, F., Poniszewska, A., 2003. Verification of access control coherence in information system during modifications. In: Proceedings of the 12th IEEE International WETICE, Austria.
    • Goncalves, G., Hemery, F., Poniszewska, A., 2003. Verification of access control coherence in information system during modifications. In: Proceedings of the 12th IEEE International WETICE, Austria.
  • 32
    • 50049090322 scopus 로고    scopus 로고
    • He, Q., Antn, A.I., 2003. A framework for modeling privacy requirements in role engineering. In: Proceedings of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03), Austria.
    • He, Q., Antn, A.I., 2003. A framework for modeling privacy requirements in role engineering. In: Proceedings of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03), Austria.
  • 33
    • 50049132865 scopus 로고    scopus 로고
    • Jajodia, S., Subrahmanian, V.S., Samarati, P., Bertino, E., 1998. An unified framework for enforcing multiple access control policies. In: Proceedings of the ACM SIGMOD Conference of Management of Data.
    • Jajodia, S., Subrahmanian, V.S., Samarati, P., Bertino, E., 1998. An unified framework for enforcing multiple access control policies. In: Proceedings of the ACM SIGMOD Conference of Management of Data.
  • 34
    • 50049135184 scopus 로고    scopus 로고
    • Kettani, N., Mignet, D., Par, P., Rosenthal-Sabroux, C., 1998. From Merise to UML, Eyrolles.
    • Kettani, N., Mignet, D., Par, P., Rosenthal-Sabroux, C., 1998. From Merise to UML, Eyrolles.
  • 36
    • 50049133429 scopus 로고    scopus 로고
    • Le Moigne, J.L., 1994. The Theory of General System: Conception Theory, PUF, Paris.
    • Le Moigne, J.L., 1994. The Theory of General System: Conception Theory, PUF, Paris.
  • 37
    • 50049104171 scopus 로고    scopus 로고
    • Melese, J., 1972. Component Analysis of systems, Editions Hommes et Techniques.
    • Melese, J., 1972. Component Analysis of systems, Editions Hommes et Techniques.
  • 38
    • 0242709332 scopus 로고    scopus 로고
    • Neumann, G., Strembeck, M., 2002. A scenario-driven role engineering process for functional RBAC roles. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT02).
    • Neumann, G., Strembeck, M., 2002. A scenario-driven role engineering process for functional RBAC roles. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT02).
  • 39
    • 50049131076 scopus 로고    scopus 로고
    • Object Management Group, OMG Unified Modeling Language Specification, 2000.
    • Object Management Group, OMG Unified Modeling Language Specification, 2000.
  • 40
    • 50049124436 scopus 로고    scopus 로고
    • Object Management Group, OMG Unified Modeling Language Specification, 2004.
    • Object Management Group, OMG Unified Modeling Language Specification, 2004.
  • 44
    • 50049109694 scopus 로고    scopus 로고
    • Poniszewska, A., 2003. UML specification of access control in information systems: cooperative approach of role conception in RBAC model. PhD thesis, Artois University, France, May.
    • Poniszewska, A., 2003. UML specification of access control in information systems: cooperative approach of role conception in RBAC model. PhD thesis, Artois University, France, May.
  • 46
    • 24144477860 scopus 로고    scopus 로고
    • Poniszewska-Maranda, A., Goncalves, G., Hemery, F., 2005. Representation of extended RBAC model using UML language. In: Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, LNCS, Springer-Verlag.
    • Poniszewska-Maranda, A., Goncalves, G., Hemery, F., 2005. Representation of extended RBAC model using UML language. In: Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, LNCS, Springer-Verlag.
  • 47
    • 33846265025 scopus 로고    scopus 로고
    • Poniszewska-Maranda, A. 2005. Role engineering of information system using extended RBAC model. In: Proceedings of the 14th IEEE International WETICE, Sweden.
    • Poniszewska-Maranda, A. 2005. Role engineering of information system using extended RBAC model. In: Proceedings of the 14th IEEE International WETICE, Sweden.
  • 48
    • 0033646113 scopus 로고    scopus 로고
    • Rockle, H., Schimpf, G., Weidinger, R., 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, Germany.
    • Rockle, H., Schimpf, G., Weidinger, R., 2000. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, Germany.
  • 49
    • 0017428556 scopus 로고
    • Structured analysis (SA): a language for communicating ideas
    • Ross D. Structured analysis (SA): a language for communicating ideas. IEEE Trans Soft Engineering (1977) 16-34
    • (1977) IEEE Trans Soft Engineering , pp. 16-34
    • Ross, D.1
  • 50
    • 50049105752 scopus 로고    scopus 로고
    • Sandhu, R. S., 1990. Separation of duties in computerized information systems. In: Proceedings of the IFIP WG 11.3 Workshop on Database Security, Halifax.
    • Sandhu, R. S., 1990. Separation of duties in computerized information systems. In: Proceedings of the IFIP WG 11.3 Workshop on Database Security, Halifax.
  • 52
    • 50049117206 scopus 로고    scopus 로고
    • Sandhu, R.S., 1996. Role hierarchies and constraints for lattice-based access control. In: Proceedings of the 4th European Symposium of Research in Computer Security, Italy.
    • Sandhu, R.S., 1996. Role hierarchies and constraints for lattice-based access control. In: Proceedings of the 4th European Symposium of Research in Computer Security, Italy.
  • 56
    • 0242625217 scopus 로고    scopus 로고
    • Schaad, A., Moffett, J.D., 2002. A lightweight approach to specification and analysis of role based access control extensions. In: Proceedings of the ACM SACMAT.
    • Schaad, A., Moffett, J.D., 2002. A lightweight approach to specification and analysis of role based access control extensions. In: Proceedings of the ACM SACMAT.
  • 57
    • 50049130712 scopus 로고    scopus 로고
    • Schimpf, G., 2000. Role-engineering critical success factors for enterprise security administration. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC00).
    • Schimpf, G., 2000. Role-engineering critical success factors for enterprise security administration. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC00).
  • 58
    • 0031387996 scopus 로고    scopus 로고
    • Thomas, R.K., 1997. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the 2nd ACM Workshop on Role-based Access Control, USA.
    • Thomas, R.K., 1997. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the 2nd ACM Workshop on Role-based Access Control, USA.
  • 59
    • 84982871639 scopus 로고    scopus 로고
    • Thomsen, D., O'Brien, D., Bogle, J., 1998. Role based access control framework for network enterprises. In: Proceedings of the 14th Annual Computer Security Application Conference.
    • Thomsen, D., O'Brien, D., Bogle, J., 1998. Role based access control framework for network enterprises. In: Proceedings of the 14th Annual Computer Security Application Conference.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.