Abstract
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLsec, aiming for designing RBAC policies. The features of both methodologies are represented and compared by modeling the specific system, with special attention to how RBAC policies and principles are modeled using SecureUML and UMLsec.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have