SlideShare a Scribd company logo
1 of 48
Download to read offline
Model-Based Analysis of Role-Based Access
Control
Lionel Montrieux <lionel.Montrieux@open.ac.uk>

The Open University, Milton Keynes, UK
Contents
•

Introduction

•

Access Control

•

Model-Driven Engineering

•

RBAC with MDE

•

Modelling, Verification

•

Fixing Incorrect Models

•

Performance

•

Case Study

•

Future Work
Introduction - About Me
•

PhD Dissertation: “Model-Based Analysis of Role-Based
Access Control”

•

Supervisors: Charles B. Haley (retired), Yijun Yu, Michel
Wermelinger

•

Examiners: Jon Whittle (Lancaster), Robin Laney (OU)
Access Control
Access Control in a Nutshell
•

Authentication

•

Authorisation
•

MAC

•

DAC

•

RBAC

•

ABAC

•

and many others
Role-Based Access
Control (RBAC)

[Sandhu00]
Model-Driven
Engineering
Model-Driven Engineering
•

“[…] the consideration of models as first-class entities. A
model is an artefact that conforms to a metamodel and
that represents a given aspect of a system” [Bézivin06]

•

Model-Driven Security Engineering [FernandezMedina09]
RBAC Models
UMLsec

[Jürjens05, Montrieux09, Montrieux10]
SecureUML

[Basin09, Basin11]
SecureUML (2)
Our Solution(s)
rbacDSML, rbacUML and rbacMDE	
•

one DSML
•
•

•

for RBAC only
using a UML profile

one DSL
•

•

one extension of UML
•

•

textual

to integrate RBAC into the design

from the same domain meta-model
rbacDSML, rbacUML
and rbacMDE
Domain Meta-Model

in MOF
5 constraints
•

SSoD

•

DSoD

•

Activated roles have been assigned to the user

•

Granted scenarios

•

Forbidden scenarios
A Sample Model
•

Students marks system


•

Professors and TAs can add
marks for the courses they
teach


•

Students can read their own
marks
rbacDSML

Meta-Model, in MOF
Sample rbacDSML
Model

Everything on One Diagram
rbacMDE - Sample Model
• user Doe {

role Student;

role TA;

}

user Wood {

role TA;

}

user Smith {

role Professor;

}

role Student {

permission Access Marks;

ssod Professor;

}

[…]
rbacUML	 	

Meta-Model, in MOF
Sample rbacUML Model

Access Control Diagram
Sample rbacUML Model
(2)

Class Diagram
Sample rbacUML Model
(3)

Sequence Diagram
Sample rbacUML Model
(4)

Activity Diagram
OCL Constraints Categories
•

Well-formedness

•

Verification

•

Satisfiability

•

Completeness

•

Coverage

•

Redundancy
OCL Evaluation Order

Selective evaluation
Demo
Fixing rbacDSML
Models

When errors are found
Overview

How it works
Classification of OCL Constraints
•

∀A: ∃B

•

∀A: ∄B

•

∃A: ∄B
How are Solutions Generated
•

Fixing individual errors
•

•

completeness, correctness

Combining them to fix the whole model
•

“keep” profile

•

heuristics for building the graph

•

completeness, correctness
Demo
The Tool
•

Plugins for IBM Rational
Software Architect 8.0


•

EPL licence


•

Available on github
(contributions are very
welcome)


•

rbacUML and rbacDSML
modelling and verification


•

rbacDSML fixing


•

rbacMDE in progress (using
Xtext)
Performance
250

sum
full
coverage
completeness
redundancy
satis ability
well-formedness
veri cation

time (seconds)

200

150

100

50

0

0

1000

2000

3000

4000

5000

6000

7000

8000

model size (elements + associations)

rbacUML Evaluation
Time

Time vs. model size

9000
220
200
180
160
140
120
100
80
60
40
20
0

Malformed
time (seconds)

time (seconds)

Correct
full
lazy

2000

4000

6000

8000

model size (elements + associations)

time (seconds)

Incorrect
220
200
180
160
140
120
100
80
60
40
20

full
lazy

2000

4000

6000

8000

model size (elements + associations)

rbacUML - selective
evaluation

250
200
150
100
50
0

full
lazy

2000

4000

6000

8000

model size (elements + associations)
Chiselapp

Github for the Fossil dvcs
Chiselapp
•

Created both rbacUML and rbacDSML models

•

PHP_UML to extract a class diagram, grep and manual
inspection for the rest

•

We found a bug

•

… but the maintainer insists that it’s a feature
Chiselapp rbacDSML
model
Future Work
Future Work
•

Nobody “really” uses UML [Petre13]

•

Adaptation

•

Performance improvements [Egyed07, Egyed11,
Reder13]

•

ABAC

•

Bidirectional graph transformations [Hidaka10]
Thank you. Any questions?

The tool: http://computing-research.open.ac.uk/rbac/
My dissertation: http://oro.open.ac.uk/28672/
References
•

[Basin09] Basin, D.; Clavel, M.; Doser, J. & Egea, M. Automated analysis of security-design
models Information and Software Technology, 2009, 51, 815 - 831

•

[Basin11] Basin, D.; Clavel, M. & Egea, M. A decade of model-driven security Proceedings of
the 16th ACM symposium on Access control models and technologies, ACM, 2011, 1-10

•

[Bézivin06] Bézivin, J. Model Driven Engineering: An Emerging Technical Space Generative and
Transformational Techniques in Software Engineering, 2006, 36-64

•

[Egyed07] Egyed, A. Fixing Inconsistencies in UML Design Models ICSE '07: Proceedings of the
29th international conference on Software Engineering, IEEE Computer Society, 2007, 292-301

•

[Egyed11] Egyed, A. Automatically Detecting and Tracking Inconsistencies in Software Design
Models Software Engineering, IEEE Transactions on, 2011, 37, 188 -204

•

[Fernandez-Medina09] Fernández-Medina, E.; Jurjens, J.; Trujillo, J. & Jajodia, S. Model-Driven
Development for secure information systems Information and Software Technology, 2009, 51,
809 - 814
References (2)
•

[Hidaka10] Hidaka, S.; Hu, Z.; Inaba, K.; Kato, H.; Matsuda, K. & Nakano, K.
Bidirectionalizing graph transformations Proceedings of the 15th ACM SIGPLAN
international conference on Functional programming, ACM, 2010, 205-216

•

[Jürjens05] Jürjens, J.; Lehrhuber, M. & Wimmel, G. Model-Based Design and
Analysis of Permission-Based Security Proceedings of the 10th IEEE
International Conference on Engineering of Complex Computer Systems, IEEE
Computer Society, 2005, 224-233

•

[Montrieux09] Montrieux, L. Implementation of Access Control using AspectOriented Programming University of Namur, 2009

•

[Montrieux10] Montrieux, L.; Jürjens, J.; Haley, C. B.; Yu, Y.; Schobbens, P.-Y. &
Toussaint, H. Tool support for code generation from a UMLsec property
Proceedings of the IEEE/ACM international conference on Automated software
engineering, ACM, 2010, 357-358
References (3)
•

[Montrieux11] Montrieux, L.; Wermelinger, M. & Yu, Y. Tool support for
UML-based specification and verification of role-based access control
properties ESEC/FSE: Procs. SIGSOFT Symposium and European Conf.
on Foundations of Software Engineering, ACM, 2011, 456-459

•

[Petre13] Petre, M. UML in practice 35th International Conference on
Software Engineering (ICSE 2013), 2013

•

[Reder13] Reder, A. & Egyed, A. Determining the Cause of a Design Model
Inconsistency Software Engineering, IEEE Transactions on, 2013, 1-1

•

[Sandhu00] Sandhu, R.; Ferraiolo, D. & Kuhn, R. The NIST model for rolebased access control: towards a unified standard Proceedings of the fifth
ACM workshop on Role-based access control, ACM, 2000, 47-63
Pictures Credits
•

LHC by UK dept. for Business, Innovation and Skills (by-nd)

•

Newton’s tree by Bob Franklin (by-nc-nd)

•

Robot by Yo Mostro (by-nc-nd)

•

Giant wrenches by Lars Hammar (by-nc-sa)

•

Speedometer by Don Melanson (by-nc-sa)

•

Case study by Binuri Ranashinghe (by-nc-nd)

•

Holy Grail drawings by Jessica Hardaway (with permission)

•

SecureUML models from [Basin09]

More Related Content

Similar to Model-Based Analysis of Role-Based Access Control

rbacUML at CodeGeneration 2012
rbacUML at CodeGeneration 2012rbacUML at CodeGeneration 2012
rbacUML at CodeGeneration 2012Lionel Montrieux
 
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...Amanuel Alemayehu
 
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...Modelon
 
Automated functional size measurement for three tier object relational mappin...
Automated functional size measurement for three tier object relational mappin...Automated functional size measurement for three tier object relational mappin...
Automated functional size measurement for three tier object relational mappin...IWSM Mensura
 
Incremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsIncremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsÁkos Horváth
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Models2013 tutorial-smart featuremodeling-final
Models2013 tutorial-smart featuremodeling-finalModels2013 tutorial-smart featuremodeling-final
Models2013 tutorial-smart featuremodeling-finalPhilippe Collet
 
Thesis Defense (Gwendal DANIEL) - Nov 2017
Thesis Defense (Gwendal DANIEL) - Nov 2017Thesis Defense (Gwendal DANIEL) - Nov 2017
Thesis Defense (Gwendal DANIEL) - Nov 2017Gwendal Daniel
 
Hardware-Software allocation specification of IMA systems for early simulation
Hardware-Software allocation specification of IMA systems for early simulationHardware-Software allocation specification of IMA systems for early simulation
Hardware-Software allocation specification of IMA systems for early simulationÁkos Horváth
 
comparative study software quality models
comparative study  software quality models comparative study  software quality models
comparative study software quality models Auwal Amshi
 
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber Scale
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber ScaleAI Infra Day | Model Lifecycle Management Quality Assurance at Uber Scale
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber ScaleAlluxio, Inc.
 
Ecmfa2013
Ecmfa2013Ecmfa2013
Ecmfa2013gogolla
 
Parallel verification of software architecture design
Parallel verification of software architecture designParallel verification of software architecture design
Parallel verification of software architecture designNacha Chondamrongkul
 
Cse3 March2009cwd35with Crane
Cse3 March2009cwd35with CraneCse3 March2009cwd35with Crane
Cse3 March2009cwd35with CraneEmmanuel Fuchs
 
Innovation day 2012 16. koenraad rombaut & michiel de paepe - verhaert - mo...
Innovation day 2012   16. koenraad rombaut & michiel de paepe - verhaert - mo...Innovation day 2012   16. koenraad rombaut & michiel de paepe - verhaert - mo...
Innovation day 2012 16. koenraad rombaut & michiel de paepe - verhaert - mo...Verhaert Masters in Innovation
 
Applying system thinking to model-based software engineering
Applying system thinking to model-based software engineeringApplying system thinking to model-based software engineering
Applying system thinking to model-based software engineeringProf. Amir Tomer
 
Rejunevating software reengineering processes
Rejunevating software reengineering processesRejunevating software reengineering processes
Rejunevating software reengineering processesmanishthaper
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceAntonio García-Domínguez
 

Similar to Model-Based Analysis of Role-Based Access Control (20)

rbacUML at CodeGeneration 2012
rbacUML at CodeGeneration 2012rbacUML at CodeGeneration 2012
rbacUML at CodeGeneration 2012
 
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...
RuCORD: Rule-based Composite Operation Recovering and Detection to Support Co...
 
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...
Closing the Design Cycle Loop with Executable Requirements and OSLC - IBM Int...
 
Automated functional size measurement for three tier object relational mappin...
Automated functional size measurement for three tier object relational mappin...Automated functional size measurement for three tier object relational mappin...
Automated functional size measurement for three tier object relational mappin...
 
Incremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical SystemsIncremental Queries and Transformations for Engineering Critical Systems
Incremental Queries and Transformations for Engineering Critical Systems
 
Focap
FocapFocap
Focap
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Models2013 tutorial-smart featuremodeling-final
Models2013 tutorial-smart featuremodeling-finalModels2013 tutorial-smart featuremodeling-final
Models2013 tutorial-smart featuremodeling-final
 
Thesis Defense (Gwendal DANIEL) - Nov 2017
Thesis Defense (Gwendal DANIEL) - Nov 2017Thesis Defense (Gwendal DANIEL) - Nov 2017
Thesis Defense (Gwendal DANIEL) - Nov 2017
 
Hardware-Software allocation specification of IMA systems for early simulation
Hardware-Software allocation specification of IMA systems for early simulationHardware-Software allocation specification of IMA systems for early simulation
Hardware-Software allocation specification of IMA systems for early simulation
 
comparative study software quality models
comparative study  software quality models comparative study  software quality models
comparative study software quality models
 
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber Scale
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber ScaleAI Infra Day | Model Lifecycle Management Quality Assurance at Uber Scale
AI Infra Day | Model Lifecycle Management Quality Assurance at Uber Scale
 
Viper architecture
Viper architectureViper architecture
Viper architecture
 
Ecmfa2013
Ecmfa2013Ecmfa2013
Ecmfa2013
 
Parallel verification of software architecture design
Parallel verification of software architecture designParallel verification of software architecture design
Parallel verification of software architecture design
 
Cse3 March2009cwd35with Crane
Cse3 March2009cwd35with CraneCse3 March2009cwd35with Crane
Cse3 March2009cwd35with Crane
 
Innovation day 2012 16. koenraad rombaut & michiel de paepe - verhaert - mo...
Innovation day 2012   16. koenraad rombaut & michiel de paepe - verhaert - mo...Innovation day 2012   16. koenraad rombaut & michiel de paepe - verhaert - mo...
Innovation day 2012 16. koenraad rombaut & michiel de paepe - verhaert - mo...
 
Applying system thinking to model-based software engineering
Applying system thinking to model-based software engineeringApplying system thinking to model-based software engineering
Applying system thinking to model-based software engineering
 
Rejunevating software reengineering processes
Rejunevating software reengineering processesRejunevating software reengineering processes
Rejunevating software reengineering processes
 
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a serviceCOMMitMDE'18: Eclipse Hawk: model repository querying as a service
COMMitMDE'18: Eclipse Hawk: model repository querying as a service
 

More from Lionel Montrieux

Reusable Self-Adaptation through Bidirectional Programming
Reusable Self-Adaptation through Bidirectional ProgrammingReusable Self-Adaptation through Bidirectional Programming
Reusable Self-Adaptation through Bidirectional ProgrammingLionel Montrieux
 
Self-Adaptive Cloud Infrastructures with Bidirectional Programming
Self-Adaptive Cloud Infrastructures with Bidirectional ProgrammingSelf-Adaptive Cloud Infrastructures with Bidirectional Programming
Self-Adaptive Cloud Infrastructures with Bidirectional ProgrammingLionel Montrieux
 
Self-Adaptive Federated Authorisation Infrastructures
Self-Adaptive Federated Authorisation InfrastructuresSelf-Adaptive Federated Authorisation Infrastructures
Self-Adaptive Federated Authorisation InfrastructuresLionel Montrieux
 
Bidirectional Programming for Self-adaptive Software
Bidirectional Programming for Self-adaptive SoftwareBidirectional Programming for Self-adaptive Software
Bidirectional Programming for Self-adaptive SoftwareLionel Montrieux
 
rbacDSL - slides from Code Generation 2014
rbacDSL - slides from Code Generation 2014rbacDSL - slides from Code Generation 2014
rbacDSL - slides from Code Generation 2014Lionel Montrieux
 
Open University CRC Students conference 2010
Open University CRC Students conference 2010Open University CRC Students conference 2010
Open University CRC Students conference 2010Lionel Montrieux
 
Security Analysis for Evolvable Software
Security Analysis for Evolvable SoftwareSecurity Analysis for Evolvable Software
Security Analysis for Evolvable SoftwareLionel Montrieux
 

More from Lionel Montrieux (7)

Reusable Self-Adaptation through Bidirectional Programming
Reusable Self-Adaptation through Bidirectional ProgrammingReusable Self-Adaptation through Bidirectional Programming
Reusable Self-Adaptation through Bidirectional Programming
 
Self-Adaptive Cloud Infrastructures with Bidirectional Programming
Self-Adaptive Cloud Infrastructures with Bidirectional ProgrammingSelf-Adaptive Cloud Infrastructures with Bidirectional Programming
Self-Adaptive Cloud Infrastructures with Bidirectional Programming
 
Self-Adaptive Federated Authorisation Infrastructures
Self-Adaptive Federated Authorisation InfrastructuresSelf-Adaptive Federated Authorisation Infrastructures
Self-Adaptive Federated Authorisation Infrastructures
 
Bidirectional Programming for Self-adaptive Software
Bidirectional Programming for Self-adaptive SoftwareBidirectional Programming for Self-adaptive Software
Bidirectional Programming for Self-adaptive Software
 
rbacDSL - slides from Code Generation 2014
rbacDSL - slides from Code Generation 2014rbacDSL - slides from Code Generation 2014
rbacDSL - slides from Code Generation 2014
 
Open University CRC Students conference 2010
Open University CRC Students conference 2010Open University CRC Students conference 2010
Open University CRC Students conference 2010
 
Security Analysis for Evolvable Software
Security Analysis for Evolvable SoftwareSecurity Analysis for Evolvable Software
Security Analysis for Evolvable Software
 

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Model-Based Analysis of Role-Based Access Control