{"title":"Role-Based Access Control Implementation Using Prime Numbers","authors":"Ebrahim Sahafizadeh, Sara Sartoly, A. Chamkoori","doi":"10.1109/ICCEE.2009.154","DOIUrl":null,"url":null,"abstract":"Access control is a part of software systems which hasn’t presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2009.154","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Access control is a part of software systems which hasn’t presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.