Abstract

The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLsec, aiming for designing RBAC policies. The features of both methodologies are represented and compared by modeling the specific system, with special attention to how RBAC policies and principles are modeled using SecureUML and UMLsec.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call