1 / 21

Template Based Approach for Developing a Prototype of Role Based Security Systems

This report explores the development of a prototype for role-based security systems using a template-based approach. It includes an introduction to role-based security, an evaluation of its importance and concepts, and a sample application.

ehoman
Download Presentation

Template Based Approach for Developing a Prototype of Role Based Security Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Template Based Approach for Developing a Prototype of Role Based Security Systems Moinuddin Khaja Ghouse Masters Report, Final Defense Major Professor: Dr Bill Hankley Committee Members:Dr Scott Deloach, Dr Mitchell Neilsen Department of Computing and Information Sciences Kansas State University

  2. Background

  3. Presentation Structure • Role Based Security – A Brief Introduction • The Approach • A Sample Application • Evaluation

  4. Role Based Security • Importance • General Concepts • Discretionary Access Check (DAC) • Mandatory Access Check (MAC) • Role Based Access • Roles and Operations

  5. Role Based Security • Characteristics • A Collection of job functions • Role Hierarchy • Role Authorization • Role Activation • Role Execution • Dynamic separation of duty • Operation Authorization

  6. Approach Adopted: • Operations • Tasks • Roles • Users and Privileges • Target Applications

  7. Approach: Design • Class Diagram • Use Case Diagram • Sequence Diagram

  8. Class Diagram:

  9. Use Case: Administrator

  10. Sequence: Administrator

  11. Sequence: User Actions

  12. A Sample Application • Introduction • System Users (Business Titles) • Requester • Diagnostician • Billing Person • External Expert

  13. Design of the Application

  14. Use Case: Requester

  15. Use Case: Diagnostician

  16. Class Diagram

  17. State Diagram:

  18. Sequence: Requester

  19. Sequence: Diagnostician

  20. Schema Diagram:

  21. Evaluation • Performance • Usability • Pros and Cons • Lessons Learnt

More Related