Role-Based Access Control Models
Computer
Control principles and role hierarchies
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
User Modeling and User-Adapted Interaction
Cohesive Design of Personalized Web Applications
IEEE Internet Computing
An Extended Entity-Relationship Approach to Data Management in Object-Oriented Systems
ER '93 Proceedings of the 12th International Conference on the Entity-Relationship Approach: Entity-Relationship Approach
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
Hi-index | 0.00 |
Modern information systems interact with a wide variety of users ranging from people with specific roles in business processes to end-users who access information in various ways and in different environments. Therefore, an application has to adhere to a well defined security policy on one hand and be highly adaptable to context on the other. We have extended the OM data model, with its rich support for role modelling, with concepts for modelling interactions between users and applications. In this paper, we show how the resulting interaction model can be used for role-based access control, as well as for modelling interactions in context-aware applications.