{"id":"https://openalex.org/W2128195004","doi":"https://doi.org/10.1017/s0960129512000266","title":"Employing UML and OCL for designing and analysing role-based access control","display_name":"Employing UML and OCL for designing and analysing role-based access control","publication_year":2013,"publication_date":"2013-07-08","ids":{"openalex":"https://openalex.org/W2128195004","doi":"https://doi.org/10.1017/s0960129512000266","mag":"2128195004"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0960129512000266","pdf_url":null,"source":{"id":"https://openalex.org/S101766102","display_name":"Mathematical Structures in Computer Science","issn_l":"0960-1295","issn":["0960-1295","1469-8072"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015792471","display_name":"Mirco Kuhlmann","orcid":null},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"funder","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"MIRCO KUHLMANN","raw_affiliation_strings":["Computer Science Department, Database Systems Group, D-28334 Bremen, Germany Email: mk@informatik.uni-bremen.de; gogolla@informatik.uni-bremen.de"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Database Systems Group, D-28334 Bremen, Germany Email: mk@informatik.uni-bremen.de; gogolla@informatik.uni-bremen.de","institution_ids":["https://openalex.org/I180437899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052280722","display_name":"Karsten Sohr","orcid":"https://orcid.org/0000-0001-6781-4226"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"funder","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"KARSTEN SOHR","raw_affiliation_strings":["Center for Computing Technologies, D-28334 Bremen, Germany Email: sohr@tzi.de"],"affiliations":[{"raw_affiliation_string":"Center for Computing Technologies, D-28334 Bremen, Germany Email: sohr@tzi.de","institution_ids":["https://openalex.org/I180437899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013415103","display_name":"Martin Gogolla","orcid":"https://orcid.org/0000-0003-4311-1117"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"funder","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"MARTIN GOGOLLA","raw_affiliation_strings":["Computer Science Department, Database Systems Group, D-28334 Bremen, Germany Email: mk@informatik.uni-bremen.de; gogolla@informatik.uni-bremen.de"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Database Systems Group, D-28334 Bremen, Germany Email: mk@informatik.uni-bremen.de; gogolla@informatik.uni-bremen.de","institution_ids":["https://openalex.org/I180437899"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.984,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.930796,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"23","issue":"4","first_page":"796","last_page":"833"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.9938,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9887,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5755528}],"concepts":[{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.9203803},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79963624},{"id":"https://openalex.org/C201374245","wikidata":"https://www.wikidata.org/wiki/Q104534","display_name":"Digital subscriber line","level":2,"score":0.70812917},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.69793934},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.64548725},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5755528},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5574138},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5174275},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.45542756},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3931709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2755423},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.104350835},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1017/s0960129512000266","pdf_url":null,"source":{"id":"https://openalex.org/S101766102","display_name":"Mathematical Structures in Computer Science","issn_l":"0960-1295","issn":["0960-1295","1469-8072"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311721","host_organization_name":"Cambridge University Press","host_organization_lineage":["https://openalex.org/P4310311721","https://openalex.org/P4310311702"],"host_organization_lineage_names":["Cambridge University Press","University of Cambridge"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.43,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":45,"referenced_works":["https://openalex.org/W1481362792","https://openalex.org/W1488684895","https://openalex.org/W1509266941","https://openalex.org/W1519503479","https://openalex.org/W1524147119","https://openalex.org/W1528417024","https://openalex.org/W1529039679","https://openalex.org/W1563639236","https://openalex.org/W1599739130","https://openalex.org/W1606461502","https://openalex.org/W1751157042","https://openalex.org/W1831889228","https://openalex.org/W1963887709","https://openalex.org/W1998017916","https://openalex.org/W2005937085","https://openalex.org/W2010173096","https://openalex.org/W2017960359","https://openalex.org/W2031606427","https://openalex.org/W2038953226","https://openalex.org/W2039171566","https://openalex.org/W2066266646","https://openalex.org/W2081938064","https://openalex.org/W2085120047","https://openalex.org/W2096874051","https://openalex.org/W2103317919","https://openalex.org/W2110640424","https://openalex.org/W2111445678","https://openalex.org/W2120625149","https://openalex.org/W2131213953","https://openalex.org/W2134167896","https://openalex.org/W2138561498","https://openalex.org/W2143509186","https://openalex.org/W2163283609","https://openalex.org/W2164893275","https://openalex.org/W2166602595","https://openalex.org/W2166946384","https://openalex.org/W2167122335","https://openalex.org/W2169620043","https://openalex.org/W2412353202","https://openalex.org/W2917582573","https://openalex.org/W4233648386","https://openalex.org/W4237164190","https://openalex.org/W4245790262","https://openalex.org/W4298334431","https://openalex.org/W4302311461"],"related_works":["https://openalex.org/W4390864104","https://openalex.org/W2379813727","https://openalex.org/W2373984226","https://openalex.org/W2364540050","https://openalex.org/W2361337511","https://openalex.org/W2358774039","https://openalex.org/W2353815999","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W1513229083"],"abstract_inverted_index":{"The":[0,98,129,154],"stringent":[1],"security":[2,46],"requirements":[3],"of":[4,43,63,86,90,114,131,151],"organisations":[5],"like":[6],"banks":[7],"or":[8],"hospitals":[9],"frequently":[10],"adopt":[11],"role-based":[12],"access":[13,36],"control":[14],"(RBAC)":[15],"principles":[16],"to":[17,70,109,121],"represent":[18],"and":[19,55,72,105,112,117,144,161],"simplify":[20],"their":[21,137,145],"internal":[22],"permission":[23],"management.":[24],"While":[25],"representing":[26],"a":[27,67,77,159],"fundamental":[28],"advanced":[29],"RBAC":[30,74,123,142],"concept":[31],"enabling":[32],"precise":[33],"restrictions":[34],"on":[35],"rights,":[37],"authorisation":[38,93,115],"constraints":[39,94],"increase":[40],"the":[41,44,84,87,91,119,141],"complexity":[42],"resulting":[45],"policies":[47,75,124],"so":[48],"that":[49],"tool":[50],"support":[51],"for":[52],"convenient":[53],"creation":[54],"adequate":[56],"validation":[57,163],"is":[58,66,102,156],"required.":[59],"A":[60],"particular":[61],"contribution":[62],"our":[64,152],"work":[65],"new":[68,110],"approach":[69,155],"developing":[71],"analysing":[73],"using":[76],"UML-based":[78],"domain-specific":[79],"language":[80],"(DSL),":[81],"which":[82],"allows":[83,118],"hiding":[85],"mathematical":[88],"structures":[89],"underlying":[92],"implemented":[95],"in":[96,125],"OCL.":[97],"DSL":[99,143],"we":[100],"present":[101],"highly":[103],"configurable":[104],"extensible":[106],"with":[107],"respect":[108],"concepts":[111],"classes":[113],"constraints,":[116,136],"developer":[120],"validate":[122],"an":[126],"effective":[127],"way.":[128],"handling":[130],"dynamic":[132],"(that":[133],"is,":[134],"time-dependent)":[135],"visual":[138],"representation":[139],"through":[140],"analysis":[146],"all":[147],"form":[148],"another":[149],"part":[150],"contribution.":[153],"supported":[157],"by":[158],"UML":[160],"OCL":[162],"tool.":[164]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2128195004","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-04-22T00:41:56.101136","created_date":"2016-06-24"}