skip to main content
10.1145/507711.507717acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

A scenario-driven role engineering process for functional RBAC roles

Published:03 June 2002Publication History

ABSTRACT

In this paper we present a novel scenario-driven role engineering process for RBAC roles. The scenario concept is of central significance for the presented approach. Due to the strong human factor in role engineering scenarios are a good means to drive the process. We use scenarios to derive permissions and to define tasks. Our approach considers changeability issues and enables the straightforward incorporation of changes into affected models. Finally we discuss the experiences we gained by applying the scenario-driven role engineering process in three case studies.

References

  1. G. Booch, I. Jacobson, and J. Rumbaugh. The Unified Modeling Language User Guide. Addison-Wesley, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J.M. Carroll. Five reasons for scenario-based design. In Proc. of the IEEE Annual Hawaii International Conference on System Sciences (HICSS), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E.J. Coyne. Role engineering.In Proc. of the ACM Workshop on Role-Based Access Control, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J.M. Carroll (ed.). Scenario-Based Design: Envisioning Work and Technology in System Development. John Wiley & Sons, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Epstein and R. Sandhu. Towards A UML Based Approach to Role Engineering. In Proc. of the ACM Workshop on Role-Based Access Control, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Epstein and R. Sandhu. Engineering of Role/Permission Assignments. In Proc. of the 17th Annual Computer Security Applications Conference (ACSAC), December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E.B. Fernandez and J.C. Hawkins. Determining role rights from use cases. In Proc. of the ACM Workshop on Role-Based Access Control, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D.F. Ferraiolo, J.F. Barkley, and D.R. Kuhn. A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transactions on Information and System Security, 2(1), February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, 4(3), August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Goh and A. Baldwin. Towards a more complete model of role. In Proc. of the ACM Workshop on Role-Based Access Control, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. O. Gotel and A. Finkelstein. An analysis of the requirements traceability problem. In Proc. of the IEEE International Conference on Requirements Engineering (ICRE), 1994.Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Gutzmann. Access control and session management in the HTTP environment. IEEE Internet Computing, January/February 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. Jacobson. Object-Oriented Software Engineering. Addison-Wesley, 1992. Google ScholarGoogle Scholar
  14. M. Jarke, X.T. Bui, and J.M. Carroll. Scenario management: An interdisciplinary approach. Requirements Engineering Journal, 3(3/4), 1998.Google ScholarGoogle Scholar
  15. C. Kaner, J. Falk, and H.Q. Nguyen. Testing Computer Software (second edition). John Wiley & Sons, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Kotonya and I. Sommerville. Requirements Engineering - Processes and Techniques. John Wiley & Sons, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Neumann and M. Strembeck. Design and Implementation of a Flexible RBAC-Service in an Object-Oriented Scripting Language. In Proc. of the 8th ACM Conference on Computer and Communications Security (CCS), November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W.E. Perry. Effective Methods for Software Testing (second edition). John Wiley & Sons, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Ramesh and M. Jarke. Toward reference models for requirements traceability. IEEE Transactions on Software Engineering, 27(1), January 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Robertson and J. Robertson. Mastering the Requirements Process. Addison-Wesley, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proc. of the ACM Workshop on Role-Based Access Control, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Rolland, G. Grosz, and R. Kla. Experience with goal-scenario coupling in requirements engineering. In Proc. of the IEEE International Symposium on Requirements Engineering (RE), 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2), February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. The UNIVERSAL Brokerage Platform Homepage. http://www.ist-universal.org.Google ScholarGoogle Scholar
  25. A. van Lamsweerde. Goal-Oriented Requirements Engineering: A Guided Tour. In Proc. of the 5th IEEE International Symposium on Requirements Engineering (RE), August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A scenario-driven role engineering process for functional RBAC roles

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
          June 2002
          170 pages
          ISBN:1581134967
          DOI:10.1145/507711
          • General Chair:
          • Ravi Sandhu,
          • Program Chair:
          • Elisa Bertino

          Copyright © 2002 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 June 2002

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader