
The purpose of access control is to limit the actions on a computer system that a legitimate user can perform. Role-based access control (RBAC) has generated great interest in the security community as a flexible approach in access control. An important aspect of RBAC is constraints that constrain what components in RBAC are allowed to do. Although researchers have identified useful constraints using formal specification languages such as RCL2000, there still exists a demand to have constraint specification languages for system developers who are working on secure systems development. The authors discuss another approach to specifying constraints using a de facto constraint specification language in the software engineering arena. We use a declarative language, Object Constraint Language (OCL) that is part of the Unified Modeling Language (UML) and has been used in object oriented analysis and design. We describe how to specify previously identified role-based authorization constraints, and the future direction of this work is also addressed.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 6 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
