Specification and Verification of Constraints in Role Based Access Control for Enterprise Security System

  • Authors:
  • Grzegorz Kolaczek

  • Affiliations:
  • -

  • Venue:
  • WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper presents a short overview of the foundationsof the role-based access control modal model and itsproprieties. In particular,the problem of definition andverification of various types of constraints is analysed.The main benefit of the presented model is that it is basedon the fundamental notions of both enterprisemanagement and information systems access control. Theother important value of the model is the possibility ofautomation of processes and implementation ofmechanisms related to access control on the basis oflogical automated reasoning and the PROLOGprogramming language.