By Topic

Role-Based Access Control Implementation Using Prime Numbers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sahafizadeh, E. ; Dept. of Inf. Technol., Payame Noor Univ. (PNU), Boushehr, Iran ; Sartoly, S. ; Chamkoori, A.

Access control is a part of software systems which hasn't presented as an independent part of software development process. It is often used after Software development and applies access policies. In this paper we present an approach to implement Role-Based Access Control (RBAC) using prime numbers in programming languages. Security Policies are able to be applied on applications source code using this approach. A major goal of our implementation is to have elegant solution, minimal changes to the source code and can implement concurrent to software implementation phase.

Published in:

Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on  (Volume:1 )

Date of Conference:

28-30 Dec. 2009