The system is required to include some kind of access security. Access to the information in the system and to the services of the system is stated by the specific access rights given to the individual user.
Characteristics: Common problem. Basic solution.
Keywords: Access rights, checking access rights, data access, information protection, security level, security policy.
The first blueprint model consists of one use case,
Manage Access Rights, handling registration and deregistration of access rights. The checking of access rights is in this blueprint mentioned ...