Download presentation
Presentation is loading. Please wait.
Published byNathan Stafford Modified over 9 years ago
1
Template Based Approach for Developing a Prototype of Role Based Security Systems Moinuddin Khaja Ghouse Masters Report, Final Defense Major Professor: Dr Bill Hankley Committee Members: Dr Scott Deloach, Dr Mitchell Neilsen Department of Computing and Information Sciences Kansas State University
2
Background
3
Presentation Structure Role Based Security – A Brief Introduction The Approach A Sample Application Evaluation
4
Role Based Security –Importance –General Concepts Discretionary Access Check (DAC) Mandatory Access Check (MAC) Role Based Access Roles and Operations
5
Role Based Security –Characteristics A Collection of job functions Role Hierarchy Role Authorization Role Activation Role Execution Dynamic separation of duty Operation Authorization
6
Approach Adopted: –Operations –Tasks –Roles –Users and Privileges –Target Applications
7
Approach: Design –Class Diagram –Use Case Diagram –Sequence Diagram
8
Class Diagram:
9
Use Case: Administrator
10
Sequence: Administrator
11
Sequence: User Actions
12
A Sample Application –Introduction –System Users (Business Titles) Requester Diagnostician Billing Person External Expert
13
Design of the Application
14
Use Case: Requester
15
Use Case: Diagnostician
16
Class Diagram
17
State Diagram:
18
Sequence: Requester
19
Sequence: Diagnostician
20
Schema Diagram:
21
Evaluation –Performance –Usability –Pros and Cons –Lessons Learnt
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.