Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/VLHCC.2008.4639087guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A model-driven approach for the visual specification of Role-Based Access Control policies in web systems

Published: 15 September 2008 Publication History

Abstract

Specifying the access policy of a web system is a relevant design concern that is often dismissed or postponed until the implementation. ADM-RBAC (Ariadne Development Method with Role-Based Access Control) is a model-driven approach for web systems that supports the specification of access control policies in an integrated way and at two abstraction levels. At the conceptual level a number of visual models specify the access policy in a way that is similar to the users’ point of view. At the detailed level, models are oriented towards providing enough details to generate prototypes in an automatic or semiautomatic way. In this paper we describe the visual models of ADM-RBAC and their empirical evaluation.

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2023)PARROTProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808807:1(1-37)Online publication date: 28-Mar-2023
  • (2017)Design notations for secure softwareSoftware and Systems Modeling (SoSyM)10.1007/s10270-015-0486-916:3(809-831)Online publication date: 1-Jul-2017
  • Show More Cited By
  1. A model-driven approach for the visual specification of Role-Based Access Control policies in web systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      VLHCC '08: Proceedings of the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing
      September 2008
      276 pages
      ISBN:9781424425280

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 15 September 2008

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
      • (2023)PARROTProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808807:1(1-37)Online publication date: 28-Mar-2023
      • (2017)Design notations for secure softwareSoftware and Systems Modeling (SoSyM)10.1007/s10270-015-0486-916:3(809-831)Online publication date: 1-Jul-2017
      • (2010)RTMEProceedings of the Third international conference on Human-centred software engineering10.5555/1939212.1939228(149-157)Online publication date: 14-Oct-2010

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media