
 
of security services. The roles and relationships 
between security components provide defence in 
depth, to any strength and depth required for a given 
situation. The concept and usage of roles in a 
dynamic manner provides a practical and flexible 
way to implement fine–grained access controls. 
ACKNOWLEDGEMENTS 
The authors would like to thank Scott Cluett for his 
valuable insight. Scott’s implementation of many 
aspects of this model provided the grounding 
required to make the model practical, and provided 
useful validation of its concepts and structures.  
REFERENCES 
Buecker, Axel, Filip, Werner, Becke, Richard, Cowan, 
Tony, Godbole, Subodh, Hinton, Heather, 
Kariyawasam, Sampath, Stranden, Harri, 2004, 
‘Federated Identity Management with IBM Tivoli 
Security Solutions’, IBM Redbooks, First Edition. 
Basin, David, Doser, Jürgen, Lodderstedt, Torsten, 2004, 
‘Model Driven Security: From UML Models to 
Access Control Infrastructures’, ACM Transactions on 
Software Engineering and Methodology, Vol. 15, No. 
1, pp. 39–91. 
Blakely, Bob, Heath, Craig & members of The Open 
group Security Forum, 2004, Technical Guide – 
Security Design Patterns, viewed January 2005, 
<http://www.opengroup.org/bookstore/catalog/g031.ht
m>. 
Bücker, Axel, Gontarczyk, Andrew, Heiser, Mari, 
Karekar, Santosh, Saunders, Patricia, Taglioni, 
Matteo, 2004, ‘Enterprise Security Architecture Using 
IBM Tivoli Security Solutions’ IBM Redbooks, 
Second Edition. 
Clarke, Siobhán, Harrison, William, Ossher, Harold, Tarr, 
Peri, 1999, ‘Subject–Oriented Design: Towards 
Improved Alignment of Requirements, Design and 
Code’, OOPSLA ’99 Proceedings, pp. 325–339. 
CSE, 2003, IT Security Zones Baseline Security 
Requirements, Sue Greaves, Communications Security 
Establishment, Ottawa. 
CSE, n.d., Introduction to Information Technology 
Security, viewed January 2006, <http://www.cse-
cst.gc.ca/tutorials/english/section1/m1/index_e.htm>. 
Entrust, 2003, Privilege Management Infrastructure Using 
Getaccess Version 7 – Detailed Architecture Report, 
from Contract: W2213-2-6111, CSE, Ottawa. 
Ferraiolo, David, Kuhn, Rick, 1995, An Introduction to 
Role–Based Access Control, NIST/ITL Bulletin, 
viewed January 2006, <http://csrc.nist.gov/rbac/NIST-
ITL-RBAC-bulletin.html>. 
IBM Microsoft, 2003, Federation of Identities in a Web 
Services World, viewed February 2005, <http://www-
128.ibm.com/developerworks/library/specification/ws-
fedworld/>. 
IBM, 2005, ‘Federated Identity Management and Web 
Services Security with IBM Tivoli Security Solutions’, 
IBM Redbooks, Second Edition.  
Indrakshi, Ray, Li, Na, France, Robert, Dae–Kyoo, Kim, 
2004, ‘Using UML to Visualize Role–Based Access 
Control Constraints’, Proceedings of SACMAT ’04, 
pp. 115–124. 
International Organization for Standardization, 1989, 
Information Processing Systems – Open Systems 
Interconnection – Basic Reference Model – Part 2: 
Security architecture, ISO 7498-2:1989, International 
Organization for Standardization, Geneva. 
International Organization for Standardization, 2002, 
Security techniques — Security information objects for 
access control, ISO/IEC 15816:2002, International 
Organization for Standardization, Geneva. 
Jürgens, Jan, 2002, ‘UMLSec: Extending UML for Secure 
Systems Development’, UML 2002 - The Unified 
Modeling Language Proceedings, pp. 412–425. 
Kendall, Elizabeth, 1999, ‘Role Model Designs and 
Implementations with Aspect–oriented Programming’, 
OOPSLA ’99 Proceedings, pp. 353–369. 
Lodderstedt, Torsten, Basin, David, Doser, Jürgen, 2002, 
‘SecureUML: A UML-Based Modeling Language for 
Model-Driven Security’, UML 2002 - The Unified 
Modeling Language Proceedings, pp. 426–441 
Miller, Mark, Yee, Ka–Ping, Shapiro, Jonathan, 2003, 
Capability Myths Demolished, Technical Report 
SRL2003-02, Johns Hopkins University Systems 
Research Laboratory, Baltimore. 
Organization for the Advancement of Structured 
Information Standards, 2005a, eXtensible Access 
Control Markup Language, XACML Version 2.0, 
OASIS, Billerica. 
Organization for the Advancement of Structured 
Information Standards, 2005b, Assertions and 
Protocols for the OASIS Security Assertion Markup 
Language (SAML) V2.0, OASIS, Billerica. 
Tulloch, Mitch, 2003, Microsoft Encyclopedia of Security. 
Microsoft Press, Redmond. 
Yoder, Joseph, Barcalow, Jeffrey, 1997, ‘Architectural 
Patterns for Enabling Application Security, PloP ’97 
Proceedings. 
© Her Majesty the Queen in Right of Canada, 2007 
 
 
 
 
 
 
 
 
 
 
 
 
ICEIS 2007 - International Conference on Enterprise Information Systems
364