230 likes | 377 Vues
This report explores a template-based methodology for constructing a prototype of role-based security systems. It introduces fundamental concepts of role-based security, including discretionary and mandatory access control, role hierarchy, and authorization. The approach is illustrated through a sample application, showcasing its design through class and use case diagrams. The report evaluates performance, usability, and lessons learned. This work is guided by a committee from the Department of Computing and Information Sciences at Kansas State University.
E N D
Template Based Approach for Developing a Prototype of Role Based Security Systems Moinuddin Khaja Ghouse Masters Report, Final Defense Major Professor: Dr Bill Hankley Committee Members:Dr Scott Deloach, Dr Mitchell Neilsen Department of Computing and Information Sciences Kansas State University
Presentation Structure • Role Based Security – A Brief Introduction • The Approach • A Sample Application • Evaluation
Role Based Security • Importance • General Concepts • Discretionary Access Check (DAC) • Mandatory Access Check (MAC) • Role Based Access • Roles and Operations
Role Based Security • Characteristics • A Collection of job functions • Role Hierarchy • Role Authorization • Role Activation • Role Execution • Dynamic separation of duty • Operation Authorization
Approach Adopted: • Operations • Tasks • Roles • Users and Privileges • Target Applications
Approach: Design • Class Diagram • Use Case Diagram • Sequence Diagram
A Sample Application • Introduction • System Users (Business Titles) • Requester • Diagnostician • Billing Person • External Expert
Evaluation • Performance • Usability • Pros and Cons • Lessons Learnt