An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
|
|
|
- Rosemary Stevens
- 10 years ago
- Views:
Transcription
1 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer Science Sogang University Seoul , Korea {sejong,spark}@dblab.sogang.ac.kr Access control is a difficult security issue for enterprise organizations. Role-based access control (RBAC) model is well known and recognized as a good security model for enterprise environment. Though RBAC is a good model, administration of RBAC including building and maintaining access control information remains a difficult problem in large companies. RBAC model itself does not tell the solution. Little research was done on practical ways to find the information that fills RBAC components such as role, role hierarchy, permission-role assignment, user-role assignment, and so on from the real world. In this paper we suggest the possibility of model-based administration of RBAC in an enterprise environment. Model-based administration methods allows security administrator to manage access control by GUI that supports graphical enterprise model. If security administrator creates or changes some of components of graphical enterprise model, then it is translated to RBAC schema information by administration tool. We focus on a practical way of deriving access control information from real world. It is a core of model-based administration. Here we show the derivation method and implementation experiences Keywords: RBAC, access control, security, enterprise environment, business model 1. INTRODUCTION Since many companies have recognized the computer as an essential tool to increase competitiveness, they have competitively built their computer systems. Hence growth of companies, volumes of information, and related personnel have increased, and as a result, security problems have become increasingly difficult. Access control is an important security issue in the enterprise environment. Access means the ability to perform work such as reading, writing, and the execution of the system resources. Access control is the way to control the ability to perform the work [1]. The huge number of information objects and users in a large company make the right of access relationship between the users and information objects a difficult issue. Role-based access control model (RBAC) [5, 6] is known to be a proper access control model for enterprise environment. The central notion of RBAC is to prevent users from accessing company information by discretion. Instead, access rights are associ- Received January 30, 2001; accepted July 10, Communicated by Chi Sung Laih. 921
2 922 SEJONG OH AND SEOG PARK ated with roles in which users are assigned to appropriate roles. The notion of role is an enterprise or organizational concept. As such, RBAC allows us to model security from an enterprise perspective since we can align security modeling with the roles and responsibilities in the company. Even though RBAC research was increasingly developed, little research was done on the practical way towards administration access control information from the enterprise world. RABC administration includes building and updating RBAC information. Finding the role, constructing role hierarchy (RH), user-role assignment (URA), and permission-role assignment (PRA) are responsibilities of developers or security administrators. A large enterprise-wide system has a number of roles, users, and information objects. Therefore, managing these roles and users, and their interrelationships is a formidable task for security administrators. Administrative RBAC (ARBAC) [7] is an alternative solution. Though ARBAC relaxes the complexity of administration, it cannot solve the fundamental problems of administration. In this paper, we have suggested the framework for the model-based RBAC administration method. In the general RBAC administration, security administrators deal with raw access control information such as role, RH, URA, and PRA. In the model-based RBAC administration, security administrators deal with graphical enterprise model, and the change of enterprise model reflects in a semi-automatic way in the raw access control information. Therefore security administrators can manage access control information easily. The security administration is very intuitive and real world friendly in our method. In the previous paper, we suggested task-role-based access control (T-RBAC) model [2, 3]. It is an improved RBAC model that solves the problems of general RBAC model such as role hierarchy [10, 11]. In T-RBAC model, permissions are assigned to tasks, and tasks are assigned to roles. Task is the unit of job function or business activity. In this paper we suppose T-RBAC as the access control model rather than general RBAC model. The rest of this paper is organized as follows. In section 2 we show our motivation and basic idea of model-based RBAC administration method. Section 3 has a brief description of T-RBAC model. Section 4 describes process of deriving access control (T-RBAC) information from enterprise model. Discussion about derivation process is in section 5. In section 6 we introduce implementation of model-based RBAC administration method. Section 7 presents conclusion and proposes further work. (Note. For simplicity, we use some abbreviations such as: URA/ user-role assignment, TRA/ task-role assignment, PTA/ permission-task assignment, (S)-RH/ (supervision)-role hierarchy). 2. MOTIVATION As we said before, building and managing RBAC schema information are important issues in an enterprise environment. Let s see a simple management problem as an example. We suppose a situation as follows: There is a role, sales_manager. Now the security administrator should revoke all write privileges that belong to the task of processing sales orders.
3 AN IMPROVED ADMINISTRATION METHOD ON RBAC 923 In the general RBAC model, the security administrator follows the following two steps. First, he/she should know which information objects belong to the task. Second, he/she updates PRA (permission-role assignment) information to revoke target 'write' privileges from the role sales_ manager. In the general RBAC model, permissions are directly assigned the roles as shown in Fig. 1. It is difficult for the security administrator to know which information objects belong to specific tasks. He/she needs background knowledge about tasks and related information objects. But it is a very difficult task in a large company. If an object belongs to many tasks, changing privilege of the object may bring about an undesirable result. The second step also has problems. The security administrator deal with raw data in PRA table to update privilege, and it is not convenient. PRA table shows simple information. The system cannot show any extra information for example, the effects of updating about the behavior of updating PRA table. Building RBAC schema information has similar difficulties in the above said management problems. Role_name sales_manager sales_manager sales_manager sales_manager Permission File1[r,w] File2[r,w] File3[r] File4[r,w] Fig. 1. An example of PRA table. The fundamental problem of RABC administration, including building and managing RBAC schema information, is lack of information of interrelation between change of real world and change of RABC schema information. Security administrator needs an efficient user interface that supports real world style access control. This is our motivation. To solve the problem, we adopt an improved RBAC model, task-role-based access control (T-RBAC) model. Permissions are assigned to related tasks, and tasks are assigned to related roles in T-RABC. Therefore PRA table in RBAC is separated to PTA (permission task assignment) and TRA (task role assignment) tables in T-RBAC. Fig. 2 shows PTA and TRA tables as an equivalent PRA table in Fig. 1. Users may easily know which information objects are related to the specific task in T-RBAC model. Role_name Task Task Permission sales_manager sales_order sales_order File1[r,w] sales_manager sales_account sales_order File3[r] sales_account sales_account File2[r,w] File4[r,w] (a) TRA table (b) PTA table Fig. 2. TRA & PTA table in T-RBAC.
4 924 SEJONG OH AND SEOG PARK VP_sales Sales_ manager Sales_man Sales_clerk Sales_ oeder Sales_ manager Sales_ account file1 file3 r r Sales_ oeder w file1 (a) Click sales_manager role in the organization diagram (b) Click sales_order task in the role-task diagram (c) Delete file1[w] in the task diagram Task sales_order sales_order sales_account sales_account Permission file1[r] file3[r] file2[r,w] file4[r,w] (d) T-RBAC system updates PTA table automatically. Fig. 3. Permission update example in the model-based security administration. Fig.3 shows a model scenario of permission update in the model-based security administration. Security administrator uses GUI instead of dealing with PTA table directly. The GUI supports some of business model such as organization diagram and task diagram. Security administrator clicks or changes related components of the diagrams. Then the result automatically reflects in corresponding records at the TPA table. If we can implement such an administration GUI, security administration may become an easy task. It is the final goal for us. In many business software projects such as ERP it builds a conceptual enterprise model before programming information system; and the enterprise model contains access control information. Therefore we can build and manage RBAC schema information by using some enterprise model diagrams. Fig.4 shows the basic concept of model-based RBAC administration. The core of model-based RBAC administration is a derivation process. It describes how to derive RBAC schema information from an enterprise model. We predominantly describe the derivation process. Information system Enterprise world Enterprise model Information objects Software engineering T-RBAC Admin. Tool T-RBAC engine T-RBAC Schema DB Fig. 4. Basic concept of model-based RBAC administration.
5 AN IMPROVED ADMINISTRATION METHOD ON RBAC A BRIEF DESCRIPTION OF T-RBAC MODEL Before we describe the derivation process of RBAC schema information, we shall introduce T-RBAC model. T-RBAC is an integrated model of role-based access control and activity-based access control models based on task classification. There are 4 classes that have different access control characteristics in the companies. If a user U1 has tasks that belong to class S, their related access rights are inherited to user Un who has a higher job position than U1 in the organization structure. Tasks that belong to class W, which is related with workflow and show the characteristics of an active access control model. Tasks that belong to class P are private ones, they do not have inheritance characteristic and related with workflow. Class A has characteristics of class S and class W. Class W and class P do not have inheritance characteristics. Fig. 5 shows a brief of T-RBAC. The major difference between T-RBAC and RBAC is that the access rights are assigned to task in T-RBAC, but access rights are assigned to role in RBAC. In the real world access rights are needed for the user to perform tasks. So assigning access rights to task is reasonable. Another difference is the role hierarchy. We use supervision role hierarchy (S-RH) instead of general role hierarchy. In the S-RH, higher role does not inherit all access rights of the lower role in the role hierarchy. Only access rights of class S and class A are inherited from lower role to the higher role. Tasks in the class W and class A are used to compose workflow. Workflow creates the workflow instances that are set of task instances. Access rights are assigned to tasks in the class W and class A statically. But the access rights are bound and activated during the execution of task instance. Workflow schema S-RH User Role Class W Class A Class S Permission Session Class P Task Fig. 5. T-RBAC model. Constraint 4. DERIVATION PROCESS OF T-RBAC SCHEMA INFORMATION 4.1 Basic Philosophy and Assumption The fact that access control model has a profound relationship with real world encourages us to research derivation process of access control information form enterprise
6 926 SEJONG OH AND SEOG PARK environment. We think that enterprise environment implies T-RBAC aspects, and there exists a methodology to derive the T-RBAC schema information. Our derivation process is based on the following assumptions: There exist domain experts who understand the business model and know the T-RBAC concepts. They create a reduced enterprise model from the original enterprise model according to the proposed notation. There exists user information in the target organization. (In the proposed process, we use existing user information rather than creating new user information). All the concepts of derivation are based on Chapter 2 and Section 4.1. We consider three types of roles: Organizational role (ex. Sales_Dept, Finance_Dept): This is a basic role for all users who belong to the organization. Therefore, the permissions are inherited to users who belong to the organization. Job position role (ex. Vice_President_Sales, Finance_Manager) Business role (ex. Developer, Programmer, Employer, Customer) Enterprise model Reduced Enterprise model T-RBAC schema information Organization Organization Task Task BP BP Info. objects Info. objects User_List User_List task Task classification role Role hierarchy URA PTA TRA Constraints Info. object User Fig. 6. Basic strategy of derivation. Our basic strategy is shown in Fig. 6. We assume that the enterprise model is built within the software engineering process. From the enterprise model, we can derive related components of T-RBAC and reform them to our predefined business model diagrams (reduced enterprise model). Then we derive T-RBAC information from the reduced enterprise model in a semi-automatic fashion, so the reduced enterprise model
7 AN IMPROVED ADMINISTRATION METHOD ON RBAC 927 provides realistic material for the derivation process. To find reasonable reduced enterprise model diagrams, we analyzed well-known business modeling tools and their supported diagrams. Then we chose model components that contain T-RBAC access control information as shown in Fig. 7. The reduced enterprise model includes four diagrams, as shown in Figs These diagrams are a minimal set of enterprise model diagrams that imply T-RBAC aspects. Employee Information object Create_ invoice Task Account_ dept Organization unit Task executor Sales_ clerk Job position or Business role Sales_Manager Business flow S_SOD1 Separation of duty Fig. 7. Notations of reduced enterprise model. company President Manufact_ dept Sales_dept Finance_ dept VP_ manufact VP_sales VP_ finance Sales_ manager Sales_ man Sales_ clerk Fig. 8. Organization diagram.
8 928 SEJONG OH AND SEOG PARK Customer Employee Order Invoice Order_detail Sales_man Fig. 9. Information object diagram. Sales_Manager Order Select Create_ invoice Insert Update Invoice Order Fig. 10. Task diagram. S_SOD1 Create_ invoice Process_ invoice Create_ order review_ Initial_order handle_ order D_SOD1 Pack_ product Fig. 11. Business process diagram. Fig. 8 is an organization diagram where rectangles are divisions, and parallelograms are job positions that belong to the division. The organization diagram shows the division hierarchy of organization, and job position hierarchies. Fig. 9 is an information object diagram. For simplicity we assume that an information object is a file or table in the database. Fig. 9 can be translated from the E-R diagram of the Enterprise model. Fig. 10 is a task diagram that shows a work unit and its input/output data. It also shows the subjects (executors) that execute the task. Fig. 11 is a business process diagram that shows the workflow and tasks in relation to separation of duty. Here D_SOD stands for dynamic separation of duty and S_SOD stands for static separation of duty.
9 AN IMPROVED ADMINISTRATION METHOD ON RBAC The Steps of Derivation Process The complete steps of the derivation process are shown in Fig. 12. The basic strategy is to build a reduced enterprise model from a pre-constructed large business model (Step.1) and to derive access control information from the reduced enterprise model (Steps. 2-7). Initial input of the process is the pre-constructed enterprise model and user information. Final output of the process is SQL script that makes T-RBAC data into the database or text files that contain T-RBAC schema information. The sign means that the step can be processed automatically without human intervention. Enterprise model Step.1 abstract Required components Reduced Enterprise model Step.2 Generate model source model source Step.3 Find role modified model source Step.4 Classify tasks 2nd modified model source User Info User List SQL Script Text file Step.7 Create T-RBAC Schema info Step.6 Verify Abstraction result URA Info Step.5 Assign user to role Fig. 12. Derivation process of T-RBAC schema information. Now we describe each step of the derivation process of the T-RBAC aspects. The heading of each step shows its input, output, and related reduced enterprise diagram. 'Derived T-RBAC components' means the T-RBAC components that can be derived after the process. Step. 1 Abstract required components Input: Enterprise model, User Information Output: Reduced enterprise model, User list Related Diagram:- Derived T-RBAC Components:User The main work of step. 1 is to derive T-RBAC-related components from the enterprise model reduction to the reduced enterprise model. The enterprise model can be constructed using various tools, or methodologies. If the reduced enterprise model diagrams have been used in the construction of enterprise model, step.1 would be simple. Further, if the enterprise model includes diagrams from Figs. 8-11, step. 1 can even be processed automatically. Otherwise, human experts, in general the developers of the enterprise model, should perform step. 1 manually. Generally, user information is not included in
10 930 SEJONG OH AND SEOG PARK the business model. Thus, user information needs to be added. The user list in the output includes user id, organization name,and job position. Step. 2 Generate model source Input: Reduced enterprise model Output: Model source Related Diagram: All four Reduced enterprise model diagrams Derived T-RBAC Components: Information objects, Task, Workflow, PTA Most of the enterprise modeling tools support the function of translating the graphical model to a text source file. With this tool, step. 2 can be processed automatically. The box below shows a part of the example source file created by the Rational Rose Tool. It is translated from the information object diagram (Fig. 4). From the model source file we can derive T-RBAC information such as information object, task, workflow, and permission-task assignment (PTA). logical_models (list unit_reference_list (object Class Customer quid 39C E language Java ) (object Class Order quid 39C C2 language Java ) (object Class P_Invoice quid 39C72FD100C8 language Java ) (object Class Order_detail quid 39C B4 language Java ) (object Class Employee quid 39C730CD0352 language Java ) Step. 3 Find role Input: Model source Output: Modified model source (1) Related Diagram: Organization diagram, Task diagram Derived T-RBAC Components: Role, RH, TRA Step. 3 uses information of the task diagram and organization diagram. There are five sub-steps in step. 3.
11 AN IMPROVED ADMINISTRATION METHOD ON RBAC 931 Step 3.1 Create roles from the task diagram. The task diagram contains executor components. We can choose the executor names as role names. Four types of role are created according to the characteristics of the executors. Step 3.2 Assign tasks to roles (TRA) from the task diagram. In the task diagram the executor (role) is related to the task, an executor can be related to many tasks, and a task can be related to many executors. Step 3.3 Create the initial role hierarchy from the organization diagram. The organization diagram implies organizational role and job position role. Therefore, the initial role hierarchy contains two types of roles. For example, the organization structure in Fig. 8 is translated to the role hierarchy in Fig. 13. Step 3.4 Unify roles that contain the same tasks. If role A and role B have the same tasks, we can assume that role A and role B are the same role, and therefore these roles should be unified. Step 3.5 Adding some roles to role hierarchy. The initial role hierarchy does not contain some business roles or some executors in the task diagrams. Because they are not shown in the organization diagram and there is no information to add them in the role hierarchy, human experts should perform step 3.5. president VP manuf. VP sales VP finance Manuf. dept Sales manager Finance dept Sales_man Sales_clerk Sales dept company Fig. 13. Initial role hierarchy example. Step. 4 Classify tasks Input: Modified model source (1) Output: Modified model source (2) Related Diagram: Organization diagram, Organization diagram Derived T-RBAC Components: (classified) Task
12 932 SEJONG OH AND SEOG PARK In the T-RBAC model, tasks are classified into three classes. Different access controls are applied to tasks according to their class. There are four classification rules. Rule 1. Tasks belonging to business process and assigned to business role roles are class W Rule 2. All tasks executed by organization roles belong to class S (because they have the inheritance characteristic ) Rule 3. Tasks belonging to business process and assigned to job position roles or organizational roles are class A Rule 4. Others belong to class P The above algorithmic classification is not complete. Therefore, if necessary, a human expert executes modification. Step. 5 Assign user to role Input: User list, Modified model source (2) Output: Modified model source (2) Related Diagram: User list, Organization diagram Derived T-RBAC Components:URA According to the job position information in the user list, job position roles can be assigned to appropriate users. Organizational roles areassignedtouserswhobelongtothe organization. A human expert assigns business roles. Step. 6 Verify abstraction Result Input: User list, Modified model source (2) Output: Verified model Related Diagram: All four diagrams Derived T-RBAC Components:- After completing step.5, verification is required for the result. We can use the completeness state checking rules of Appendix C for verifying the abstraction result. Step. 7 Create T-RBAC SQL script or T-RBAC schema files Input: User list, Modified model source (2) Output: T-RBAC SQL script, T-RBAC schema files Related Diagram:- Derived T-RBAC Components:- The final step is to create an SQL script for generating T-RBAC information in the database. T-RBAC schema files, which have the same information with SQL script, can be created in exchange of SQL script. Sample script file and schema files are as follows
13 AN IMPROVED ADMINISTRATION METHOD ON RBAC 933 CREATE USER 'S001' IDENTIFIED BY qwee ; CREATE USER 'S002' IDENTIFIED BY aaas1 ;... CREATE ROLE SALES_CLERK ;... GRANT SALES_CLERK ON VP_SALES TO S001;... INSERT INTO tra_tbl (role_name, task_name) VALUES ( SALES_CLERK, ISSUE_INVOICE ); File name: URA.txt User_id assigned_role S001 SALES_CLERK S002 SALES_MANAGER 5. DISCUSSION Here we suggest a practical solution to derive the T-RBAC information from the enterprise environment; an example of this method can be found in Appendix A. During our research, we recognized some points as follows. A good enterprise model produces good T-RBAC information. The enterprise model is a realistic input source for our methodology, and the derivation process is executed semi-automatically. Therefore, the quality of T-RBAC information depends on the quality of the enterprise model. A good description of the task is the most important thing in our derivation process. As can be seen in Fig. 14, the task is the central concept of access control design. In general, the data flow diagram in the enterprise model implies task information. The main issue is that task can be described at various levels. For example, two tasks 'order_update' and 'order_cancel' can be described as a single task 'order_manage', so determining the appropriate task level is important. This issue needs more research. Total automation of the derivation process is very difficult. The ideal goal of our derivation process is total automation, but this requires enormous material information. There is a trade-off between the degree of automation and the cost of maintenance that requires material information. Supporting tools are necessary. Our derivation process deals with many related components, and therefore manual work is difficult and time consuming. Supporting tools are an essential component of our methodology. In the next section, we show the implementation result of the supporting tools. The reduced enterprise model can be used for managing (updating) the T-RBAC schema information following a change in the real world. A reduced enterprise model is necessary the first time the T-RBAC information is built. Even after the
14 934 SEJONG OH AND SEOG PARK building process, the reduced enterprise model will be used for other purposes. Maintenance of T-RBAC information will still be required to account for the changes in the real world. In this case, when the security administrator modifies the reduced enterprise model reflecting the changes in the real world, the T-RBAC schema information will be updated automatically. A management module will be added to our supporting tools in future research. Reduced enterprise model Organization Organization Task Task BP BP Info. objects Info. objects User_List User_List T-RBAC model task Task classification role Role hierarchy URA PTA TRA Constraints Info. object User Fig. 14. Relationship of reduced enterprise diagram & T-RBAC components. The derivation method of this section is only the basic skeleton. If the user wishes to apply our derivation method to the real world, the user will need to elaborate our theory in some areas, such as role finding, task classification, and user-role assignment. 6. IMPLEMENTATION Fig. 15 shows a more detailed derivation process of the T-RBAC schema information. The ARIS tool produces text source files from the inserted enterprise model diagrams. The Visual C++ language is used to program translation from text source files to the temporal database. The deriving tool, which is created by Power Builder, produces the final T-RBAC schema information from the temporal database. We show a case of derivation process in Appendix A. ARIS Text tool source insert enterprise diagrams produce text source of diagrams Visual C++ program translate text source to temp. DB Temp. DB Power Builder program derive T-RBAC schema info. form temp. DB SQL script T-RBAC schema info Fig. 15. Derivation process of T-RBAC schema information.
15 AN IMPROVED ADMINISTRATION METHOD ON RBAC 935 The ultimate objective of our proposed method is to combine security engineering and software engineering, the intermediate concept being a business model. The proposed method may be used as a basis for business-model-based access control. In the model-based access control, security administrators deal with the business model instead of dealing with access control data as shown in Fig. 16. In this case, updating the business model leads to changes in the access control data. Fig. 16. Example of model-based access control. 7. CONCLUSIONS AND FURTHER WORK Access control mechanism in the enterprise environment has deep relationship with the real world. Task is the central concept of design access control. Task is defined as a unit of meaningful business activity. It determines the contents of permission and role. Role is a set of tasks. T-RBAC model is based on the concept task and role. In this paper, we suggest possibility of model-based administration of (T-)RBAC. Deriving access control information from enterprise environment is core of model-based administration. It supports semi-automatic derivation mechanism. Our basic strategy is to build a reduced enterprise model from pre-constructed large business model. And to derive access control information from reduced enterprise model in a semi-automatic way. Our approach can reduce the burden of security administration in the large enterprise organizations. Security officers deal with abstract business model rather than raw security information. Also our approach has strong adaptability for changing of business processes in the real world. Developing model-based administration tool is our final goal. We implemented deri-
16 936 SEJONG OH AND SEOG PARK vation module, and management module will be added. In the long run, software engineering and access control engineering should be combined as pointed in the paper [4]. ACKNOWLEDGEMENT This work was supported by grant No from Basic Research Program of the Korea Science and Engineering Foundation. REFERENCES 1. C. P. Pfleeger, Security in Computing, second edition, Prentice-Hall International Inc., 1997, pp S. Oh and S. Park, Task-role based access control (T-RBAC): An improved access control method for enterprise environment, Lecture Note in Computer Science 1873, Database and Expert Systems Applications, Proceedings of 11th International Conference, DEXA 2000, 2000, pp S. Oh and S. Park, An integration model of role-based access control and activity-based access control using task, in Proceedings 14th Annual IFIP WG 11.3 Working Conference on Database Security, Aug. 2000, pp H. Roeckle, G. Schimpf, and R. Weidinger, Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization, in Proceedings of 5th ACM Workshop on Role-Based Access Control, 2000, pp R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control method, Magazine of IEEE Computer, Vol. 29, No. 2, 1996, pp Ferraio, J. Cugini, and R. Kuhn, Role-based access control (RBAC): Features and motivations, in Proceedings of 11th Annual Computer Security Application Conference, R. S. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, and C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline, in Proceedings of Second ACM Workshop on Role-Based Access Control, IDS Scheer, ARIS Easy Design Guide, 9. IDS Scheer, ARIS Modeling Concept, R. S. Sandhu, Role activation hierarchies, in Proceedings of 3rd ACM Workshop on Role-Based Access Control, 1998, pp J. D. Moffett, Control principles and role hierarchies, in Proceedings of 3rd ACM Workshop on Role-Based Access Control, 1998, pp
17 AN IMPROVED ADMINISTRATION METHOD ON RBAC 937 APPENDIX A As a target real world for derivation process, we choose BK21(Brain Korea 21) web site for Sogang university. The URL is htm that is a mirroring site of Three laboratories take part in the BK21 project. The target objects of access control are html or asp documents. A simple statistics of BK21 web site is as follows. Number of users 21 (professors + graduate students) Number of documents 120 (*.html, *.asp) Number of roles 12 Number of tasks 18 We modeled management of BK21 project and derived access control information by our derivation tool. We will show each step of derivation process based on derivation tool. (1) Create a reduced enterprise model (designed by ARIS Easy Design) We inserted reduced enterprise model by ARIS Easy Design that is a modeling tool. Below diagrams are example of task diagram, business process diagram, information object diagram, and organization diagram.
18 938 SEJONG OH AND SEOG PARK
19 AN IMPROVED ADMINISTRATION METHOD ON RBAC 939 (2) Generate model source We use report generation function, which is supported by ARIS tool. ** Example of model source file Demoversion Information Nr.0 ARIS Report Created: Date: Specific time: PM 3:31:08 Demoversion Information Nr.1 Database info: Server: LOCAL Database: Bk21 Users: system apply_gr_budget eepc Attributes: Objects: Demoversion Information Nr.2 apply_gr_budget Function Relationships is executed by GR_leader Position gets input from budget/review_budget.html Information carrier gets input from budget/budget_main.html Information carrier gets input from Demoversion Information Nr.3 budget/apply_gr_budget.html Information carrier budget/apply_gr_budget.html Information carrier Relationships provides input for apply_gr_budget Function budget/budget_main.html Information carrier Relationships provides input for Demoversion Information Nr.4 apply_gr_budget Function budget/review_budget.html Information carrier Relationships provides input for apply_gr_budget Function GR_leader Position Relationships Executes Demoversion Information Nr.5
20 940 SEJONG OH AND SEOG PARK (3) Abstract core data and load it to temporal DB Our derivation tool reduces useless data from model sources files and loads useful data to temporal database of derivation tool. (4) Derive basic information from temporal DB Temporal DB implies basic information such as users, roles, tasks, and objects. These are derived very easy way.
21 AN IMPROVED ADMINISTRATION METHOD ON RBAC 941 (5) Find role Derivation tool shows found roles and supports inserting unfound roles. (6) Classify task Derivation tool can classify tasks according to classification rules. Then security administrator adjusts the classification result.
22 942 SEJONG OH AND SEOG PARK (7) Assign user to role Derivation tool compares user information and task/role information. As a result, user-role assignment (URA) information is created. Security administrator can add new URA information by adjusting unmatched information. (8) Verify abstracting result We do not implement this step yet. (9) Create T-RBAC schema information Deriving tool creates T-RBAC schema information and sends it to web server which has a T-RBAC access control engine.
23 AN IMPROVED ADMINISTRATION METHOD ON RBAC 943 ** Example of T-RBAC schema file Seog Park is a Professor of Computer Science at Sogang University. He received the B.S degree in Computer Science from Seoul National University in 1978, the M.S. and the Ph.D. degrees in Computer Science from Korea Advanced Institute of Science and Technology(KAIST) in 1980 and 1983, respectively. Since 1983, he has been working in the Department of Computer Science of the College of Engineering, Sogang University. His major research areas are database security, real-time systems, data warehouse, digital lifile name : TROLE.TXT file name : TTRA.TXT // Task-Role Assignment BK21_project,2,2,ORGANIZATION DB_lab,2,2,ORGANIZATION GR_lab,2,2,ORGANIZATION ML_lab,2,2,ORGANIZATION SE_lab,2,2,ORGANIZATION DB_leader,2,2,POSITION GR_leader,2,2,POSITION ML_leader,2,2,POSITION PJ_manager,2,2,POSITION SE_leader,2,2,POSITION accountant,2,2,position web_master,2,2,position accountant,assign_budget BK21_project,review_news BK21_project,review_publication_list BK21_project,review_pj_state BK21_project,review_introduction DB_lab,review_db_publication DB_leader,apply_db_budget DB_leader,review_pj_result GR_lab,review_gr_publication GR_leader,review_pj_result GR_leader,apply_gr_budget ML_lab,review_ml_publication ML_leader,apply_ml_budget ML_leader,review_pj_result PJ_manager,approve_budget PJ_manager,review_pj_plan SE_lab,review_se_publication SE_leader,review_pj_result SE_leader,apply_se_budget web_master,reg_notice_board Sejong Oh earned his Ph.D. in the Department of Computer Science from Sogang University in He is currently a Post Doctor researcher of the School of Information Technology and Engineering, George Mason University. His main research interests include access control for enterprise and distributed systems, ERP, secure DBMS, and internet security.
24 944 SEJONG OH AND SEOG PARK brary, multimedia database systems, role-based access control and Web database. Dr. Park is a member of the IEEE Computer Society, ACM and the Korea Information Science Society. Also, he has been a member of Database Systems for Advanced Application (DASFAA) steering committee since 1999.
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Ensuring Access Control in Cloud Provisioned Healthcare Systems
Ensuring Access Control in Cloud Provisioned Healthcare Systems Hema Andal Jayaprakash Narayanan Department of Computer Science and Engineering University of Nevada, Reno Abstract An important issues in
DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS
DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS Sung Ho Jung 1, Ki Seok Lee 1, Young Woong Song 2, Hyoung Chul Lim 3, and Yoon Ki Choi 4 * 1 Ph.D., Candidate, Department of Architectural
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Task-Role Based Dual System Access Control Model
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 211 Task-Role Based Dual System Access Control Model Cui-xiao ZHANG, Ying-xin HU,Guo-bing ZHANG Computer Department,
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad, Jonathan Moffett and Jeremy Jacob EMail: {andreas, jdm, jeremy}@cs.york.ac.uk Department of Computer
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
Advanced Features for Enterprise-Wide Role-Based Access Control
Advanced Features for Enterprise-Wide -Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str. 3 50858 Köln, Germany [email protected] Abstract The administration
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
The Concept of Automated Process Control
Scientific Papers, University of Latvia, 2010. Vol. 756 Computer Science and Information Technologies 193 203 P. The Concept of Automated Process Control Ivo Oditis 1, Janis Bicevskis 2 1 Bank of Latvia,
Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs
Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs Romuald Thion and Stéphane Coulondre LIRIS: Lyon Research Center for Images and Intelligent Information Systems,
Modeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad Department of Computer Science University of York York, YO10 5DD, UK [email protected] Jonathan Moffett
Access Control Basics. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Basics Murat Kantarcioglu Access Control - basic concepts An access control system regulates the operations that can be executed
A Framework for Developing the Web-based Data Integration Tool for Web-Oriented Data Warehousing
A Framework for Developing the Web-based Integration Tool for Web-Oriented Warehousing PATRAVADEE VONGSUMEDH School of Science and Technology Bangkok University Rama IV road, Klong-Toey, BKK, 10110, THAILAND
Content Management Implementation Guide 5.3 SP1
SDL Tridion R5 Content Management Implementation Guide 5.3 SP1 Read this document to implement and learn about the following Content Manager features: Publications Blueprint Publication structure Users
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
SOLUTION BRIEF CA ERwin Modeling. How can I understand, manage and govern complex data assets and improve business agility?
SOLUTION BRIEF CA ERwin Modeling How can I understand, manage and govern complex data assets and improve business agility? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT CA ERwin Modeling
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role Based Access Control and the JXTA Peer-to-Peer Framework Amit Mathur Symantec Corporation Cupertino, California Suneuy Kim Department of Computer Science San José State University San José, California
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
SUSTAINABLE BUSINESS PROCESS MANAGEMENT MODEL FOR CONSTRUCTION COMPANIES
SUSTAINABLE BUSINESS PROCESS MANAGEMENT MODEL FOR CONSTRUCTION COMPANIES Young Woong, Song 1 and Yoon Ki, Choi 2 * 1 MEST-NRF Research Professor, Ph.D., Research Institute of Frontier Technology, Soong
Business Process Modelling Languages, Goals and Variabilities
Business Process Modelling Languages, Goals and Variabilities Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Towards Model-Driven Approach for Rapid ERP Development
Towards Model-Driven Approach for Rapid ERP Development Igor Miletić 1, Marko Vujasinović², and Zoran Marjanović³ 1 Breza Software Engineering, Kraljice Natalije 23a, 11000 Belgrade, Serbia [email protected]
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
A Monitored Student Testing Application Using Cloud Computing
A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA [email protected], [email protected]
1. Introduction 1.1 Methodology
Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview
Semantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University [email protected], [email protected] Abstract
COURSE NAME: Database Management. TOPIC: Database Design LECTURE 3. The Database System Life Cycle (DBLC) The database life cycle contains six phases;
COURSE NAME: Database Management TOPIC: Database Design LECTURE 3 The Database System Life Cycle (DBLC) The database life cycle contains six phases; 1 Database initial study. Analyze the company situation.
SQLFlow: PL/SQL Multi-Diagrammatic Source Code Visualization
SQLFlow: PL/SQL Multi-Diagrammatic Source Code Visualization Samir Tartir Department of Computer Science University of Georgia Athens, Georgia 30602 USA Email: [email protected] ABSTRACT: A major problem
Modeling the User Interface of Web Applications with UML
Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in
Design Authorization Systems Using SecureUML
Design Authorization Systems Using SecureUML By Rudolph Araujo & Shanit Gupta, Foundstone Professional Services February 2005 Overview This whitepaper describes the Foundstone SecureUML template, a Microsoft
Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture
Integrating Policy-Driven Role Based Access Control with the Common Data Architecture Along Lin Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-59 April, 1999 E-mail: [email protected]
Online Enrollment and Administration System
FYP Proposal Report Real World Database Development by Kong Koon Kit Chan Yin Mo Leung Shiu Hong Advised by Prof. Frederick H. Lochovsky Submitted in partial fulfillment of the requirements for COMP 4981
Proposal for a Vehicle Tracking System (VTS)
Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Improving Interoperability in Mechatronic Product Developement. Dr. Alain Biahmou, Dr. Arnulf Fröhlich, Dr. Josip Stjepandic
International Conference on Product Lifecycle Management 1 Improving Interoperability in Mechatronic Product Developement Dr. Alain Biahmou, Dr. Arnulf Fröhlich, Dr. Josip Stjepandic PROSTEP AG Dolivostr.
UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts
UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts Banu Aysolmaz 1 and Onur Demirörs 2 1, 2 Informatics Institute, Middle East Technical University, Ankara,
USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT
TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the
Time Monitoring Tool Software Requirements Specifications. Version <1.0>
Time Monitoring Tool Software Requirements Specifications Version Revision History Date Version Description Author First version Martin Robillard Page 2 of 18 Table of Contents
Modeling Web Applications Using Java And XML Related Technologies
Modeling Web Applications Using Java And XML Related Technologies Sam Chung Computing & Stware Systems Institute Technology University Washington Tacoma Tacoma, WA 98402. USA [email protected] Yun-Sik
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
OnePurdue HR Organizational Management. Overview of Organizational Management Objects in SAP
OnePurdue HR Organizational Management Overview of Organizational Management Objects in SAP Version 1 March 2, 2006 GENERAL INFORMATION... 3 ORGANIZATIONAL MANAGEMENT OBJECTS... 3 ORGANIZATIONAL UNITS
Semantic Analysis of Business Process Executions
Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com
Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study
Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department D-28334 Bremen, Germany
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
FACULTY STUDENT MENTORSHIP PROGRAM. A Thesis. Presented to the. Faculty of. San Diego State University. In Partial Fulfillment
FACULTY STUDENT MENTORSHIP PROGRAM A Thesis Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Pooja
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
A GTRBAC Based System for Dynamic Workflow Composition and Management
A GTRBAC Based System for Dynamic Workflow Composition and Management Basit Shafiq, Arjmand Samuel, and Halima Ghafoor Purdue University {shafiq, amsamuel}@ecn.purdue.edu Abstract In this paper, we propose
Adaptive User Interface Modeling Design for Webbased Terminal Middleware
Adaptive User Interface Modeling Design for Webbased Terminal Middleware Sunghan Kim and Seungyun Lee Standard Research Center, ETRI, Daejeon, Korea {sh-kim, syl}@etri.re.kr Abstract. This paper shows
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow
FreeForm Designer. Phone: +972-9-8309999 Fax: +972-9-8309998 POB 8792, Natanya, 42505 Israel www.autofont.com. Document2
FreeForm Designer FreeForm Designer enables designing smart forms based on industry-standard MS Word editing features. FreeForm Designer does not require any knowledge of or training in programming languages
A Tool for Generating Relational Database Schema from EER Diagram
A Tool for Generating Relational Schema from EER Diagram Lisa Simasatitkul and Taratip Suwannasart Abstract design is an important activity in software development. EER diagram is one of diagrams, which
NetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
A Concept for an Electronic Magazine
TERENA-NORDUnet Networking Conference (TNNC) 1999 1 A Concept for an Electronic Magazine Alexander von Berg Helmut Pralle University of Hanover, Institute for Computer Networks and Distributed Systems
DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM
Computing and Informatics, Vol. 30, 2011, 419 428 DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM Malrey Lee Center for Advanced Image and Information Technology
IMPROVING PRODUCTIVITY USING STANDARD MATHEMATICAL PROGRAMMING SOFTWARE
IMPROVING PRODUCTIVITY USING STANDARD MATHEMATICAL PROGRAMMING SOFTWARE $QWRQýLåPDQ 1, Samo Cerc 2, Andrej Pajenk 3 1 University of Maribor, Fakulty of Organizational Sciences.UDQM.LGULþHYDD(PDLODQWRQFL]PDQ#IRYXQLPEVL
Traceability Method for Software Engineering Documentation
www.ijcsi.org 216 Traceability Method for Software Engineering Documentation Nur Adila Azram 1 and Rodziah Atan 2 1 Department of Information System, Universiti Putra Malaysia, Company Serdang, Selangor,
i-questionnaire A Software Service Tool for Data
i-questionnaire A Software Service Tool for Data Analysis in e-business 1 ANDY S.Y. LAI, 2 Y.C. POON 1, Department of Information and Communications Technology, Hong Kong Institute of Vocational Education,
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Enterprise Integration: operational models of business processes and workflow systems *
Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 5 Database Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Database Security 1 Relational Databases constructed
Tool Support for Software Variability Management and Product Derivation in Software Product Lines
Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,
Role based access control in a telecommunications operations and maintenance network
Final thesis Role based access control in a telecommunications operations and maintenance network Performed for Ericsson AB by Peter Gunnarsson LITH-IDA-EX 05/012 SE 2005-03-01 Final thesis Role based
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: [email protected] 1, [email protected]
