Role-based authorization constraints specification using Object Constraint Language

Gail Joon Ahn, M. E. Shin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

58 Scopus citations

Abstract

The purpose of access control is to limit the actions on a computer system that a legitimate user can perform. Role-based access control (RBAC) has generated great interest in the security community as a flexible approach in access control. An important aspect of RBAC is constraints that constrain what components in RBAC are allowed to do. Although researchers have identified useful constraints using formal specification languages such as RCL2000, there still exists a demand to have constraint specification languages for system developers who are working on secure systems development. The authors discuss another approach to specifying constraints using a de facto constraint specification language in the software engineering arena. We use a declarative language, Object Constraint Language (OCL) that is part of the Unified Modeling Language (UML) and has been used in object oriented analysis and design. We describe how to specify previously identified role-based authorization constraints, and the future direction of this work is also addressed.

Original languageEnglish
Title of host publicationProceedings - 10th IEEE International Workshop on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises, WET ICE 2001
PublisherIEEE Computer Society
Pages157-162
Number of pages6
ISBN (Electronic)0769512690
DOIs
StatePublished - 2001
Event10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001 - Cambridge, United States
Duration: Jun 20 2001Jun 22 2001

Publication series

NameProceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
Volume2001-January
ISSN (Print)1524-4547

Conference

Conference10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001
Country/TerritoryUnited States
CityCambridge
Period06/20/0106/22/01

Keywords

  • Access control
  • Authorization
  • Formal languages
  • Natural languages
  • Object oriented modeling
  • Permission
  • Security
  • Software engineering
  • Specification languages
  • Unified modeling language

Fingerprint

Dive into the research topics of 'Role-based authorization constraints specification using Object Constraint Language'. Together they form a unique fingerprint.

Cite this