Integration of Systematic RBAC Security Model and UML Model

Article Preview

Abstract:

System modeling of software generally does not include security modeling. System security strategy and security mechanisms are often developed as the system supplement and improvement measures, at the latter part of system development. The irregular processing method of security requirement brings great risks to the latter security maintenance and integrations between systems. The integration of RBAC security model and the usual UML models about a system was described and the integrated approach and process was given with an example in this paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2383-2386

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Huang Chao, Sun Jianling, Wang Xinyu, et al. Security policy management for systems employing role based access control model[J]. Information Technology Journal, 2009, 8(5): 726-734.

DOI: 10.3923/itj.2009.726.734

Google Scholar

[2] Crampton J, Loizou G. Administrative scope: A foundation for role-based administrative models[J]. ACM Transactions on Information and System Security(TISSEC), 2003, 6 (2): 201-231.

DOI: 10.1145/762476.762478

Google Scholar

[3] Li Peiwu , Lu Zhengding. Encapsulation and Distributed Management of the Role Ranges in RBAC[J]. MINI—MICRO SYSTEMS. 2005, 26(2): 252-255.

Google Scholar

[4] Yue Zhang,Joshi J B D. A scoped administration model for RBAC with hybrid hierarchy[J]. Journal of Information Assurance and Security,2008,2:128-139.

DOI: 10.1109/ias.2007.90

Google Scholar

[5] Zhengfu Yang. Object-Oriented Analysis and Design[M]. Beijing: China Railway Press, 2001, 4-121.

Google Scholar

[6] Tom Pender. UML Collection [M]. Beijing: Electronics Industry Press, 2003, 25-126.

Google Scholar

[7] Kong Jun, Sun Yining, Jiang Min. The requirement analysis based on UML[J]. Computer Engineering and A pplications. 2003, 39(15): 217-219.

Google Scholar