The management of computer security profiles using a role-oriented approach

S. H. von Solms, Isak van der Merwe

Research output: Contribution to journalArticlepeer-review

14 Citations (Scopus)

Abstract

Usually, add-on security packages implement and manage access control via 'profiles', where a profile defines a set of users or resources. This paper discusses the concept of a 'role profile', where such a profile is linked to a specific (business) role in a company. A four-layered model is introduced which provides a framework for implementing the role-oriented approach in a company.

Original languageEnglish
Pages (from-to)673-680
Number of pages8
JournalComputers and Security
Volume13
Issue number8
DOIs
Publication statusPublished - 1994

Keywords

  • Individual user profile
  • Path Context Model
  • Profile
  • Resource profile
  • Resource-oriented approach
  • Role
  • Role profile
  • Transaction
  • Transaction/project profile
  • User-oriented approach

ASJC Scopus subject areas

  • General Computer Science
  • Law

Fingerprint

Dive into the research topics of 'The management of computer security profiles using a role-oriented approach'. Together they form a unique fingerprint.

Cite this