{"id":"https://openalex.org/W2395342986","doi":"https://doi.org/10.5220/0004083400800091","title":"A Declarative Fine-grained Role-based Access Control Model and Mechanism for the Web Application Domain","display_name":"A Declarative Fine-grained Role-based Access Control Model and Mechanism for the Web Application Domain","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2395342986","doi":"https://doi.org/10.5220/0004083400800091","mag":"2395342986"},"language":"en","primary_location":{"id":"doi:10.5220/0004083400800091","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004083400800091","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Software Paradigm Trends","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0004083400800091","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056603457","display_name":"Seyed Hossein Ghotbi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Seyed Hossein Ghotbi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5082741874","display_name":"Bernd Fischer","orcid":"https://orcid.org/0000-0002-1815-218X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bernd Fischer","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5056603457"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40144586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"80","last_page":"91"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.8936919569969177},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8412235975265503},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6824509501457214},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5027742385864258},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4938543438911438},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.33857861161231995},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.27338075637817383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24031081795692444}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.8936919569969177},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8412235975265503},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6824509501457214},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5027742385864258},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4938543438911438},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.33857861161231995},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.27338075637817383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24031081795692444}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0004083400800091","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004083400800091","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Software Paradigm Trends","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0004083400800091","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004083400800091","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Software Paradigm Trends","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"Access":[0],"control":[1,7,38],"policies":[2,57],"such":[3,30,43,56,85],"as":[4,44,86],"role-based":[5],"access":[6,39,113],"(RBAC)":[8],"enforce":[9],"desirable":[10],"security":[11],"properties,":[12],"in":[13,62,69,150],"particular":[14],"for":[15,101,111],"Web-based":[16],"applications":[17],"with":[18,119],"many":[19,63],"different":[20],"users.":[21],"A":[22],"fine-grained":[23,98],"RBAC":[24,99],"model":[25,89,100,169],"gives":[26,130],"the":[27,51,70,75,87,102,134,137,143,151,164,172,185,190],"developers":[28],"of":[29,47,55,81,109,117,142,153,166,175,187,192],"systems":[31],"more":[32],"customization":[33],"and":[34,53,61,140,149],"administrative":[35],"power":[36],"to":[37,40,114,133,162,171],"fine-granular":[41],"elements":[42],"individual":[45],"cells":[46],"a":[48,97,115,125,131,167,193],"table.":[49],"However,":[50],"definition":[52],"deployment":[54],"is":[58],"not":[59],"straightforward,":[60],"Web":[64,103,179,195],"applications,":[65],"they":[66],"are":[67],"hand-coded":[68],"database":[71],"or":[72,90],"scattered":[73],"throughout":[74],"application\u2019s":[76],"implementation,":[77],"without":[78],"taking":[79],"advantage":[80],"underlying":[82],"central":[83],"elements,":[84],"data":[88],"object":[91],"types.":[92],"This":[93],"paper":[94],"presents":[95],"\u03a6RBAC,":[96],"application":[104],"domain.":[105],"\u03a6RBAC":[106,145,168,188],"achieves":[107],"separation":[108],"concerns":[110],"enforcing":[112],"range":[116],"objects":[118],"mixed-granularity":[120],"levels.":[121],"Moreover,":[122],"it":[123],"provides":[124],"unique":[126],"testing":[127],"mechanism":[128],"that":[129],"guarantee":[132],"developer":[135],"about":[136],"correctness,":[138],"completeness,":[139],"sufficiency":[141],"defined":[144],"model,":[146],"both":[147],"internally":[148],"context":[152],"its":[154],"target":[155],"application.":[156],"We":[157,183],"use":[158],"code":[159],"generation":[160],"techniques":[161],"compile":[163],"specification":[165],"down":[170],"existing":[173,177],"tiers":[174],"an":[176],"domain-specific":[178],"programming":[180],"language,":[181],"WebDSL.":[182],"show":[184],"benefits":[186],"on":[189],"development":[191],"departmental":[194],"site.":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
