Mark Strembeck Institute for Complex Networks

xoRET - Brief Description:
xoRET is a graphical software tool (see screenshots here) that provides tool support for the scenario-driven role-engineering process. It facilitates the specification and inspection of trace-relations to ease change management activities, and it is capable to propose a (preliminary) policy rule set that can be imported by xoRBAC. The xoRET role engineering tool consists of the xoRET core component and the xoRET graphical user interface. xoRET allows to create and maintain the different objects that are used and produced during the scenario-driven role engineering process. The tool is implemented in Extended Object Tcl (XOTcl). The graphical user interface uses BWidget and Tk widgets. Being a research prototype, xoRET is subject to an ongoing change/improvement process resulting in new versions of the tool -- some of these versions are released on this web page at irregular intervals.

xoRET GUI main window/toolbar
xoRET GUI main window

Related Papers and Articles:

(author names on publications before June 2004 appear in alphabetical order)

Copyright policy:The papers obtained from this Web site are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
A. Baumgrass, M. Strembeck: Bridging the Gap between Role Mining and Role Engineering via Migration Guides, In: Information Security Technical Report (ISTR), Vol. 17, No. 4, May 2013 (doi, pdf)
M. Leitner, A. Baumgrass, S. Schefer-Wenzl, S. Rinderle-Ma, M. Strembeck: A Case Study on the Suitability of Process Mining to Produce Current-State RBAC Models, In: Proc. of the Workshop on Security in Business Processes (SBP), Lecture Notes in Business Information Processing (LNBIP), Vol. 132, Springer, Tallinn, Estonia, September 2012 (ps, pdf)
A. Baumgrass, M. Strembeck: An Approach to Bridge the Gap between Role Mining and Role Engineering via Migration Guides, In: Proc. of the 7th International Conference on Availability Reliability and Security (ARES), Prague, Czech Republic, IEEE, August 2012 (ps, pdf)
A. Baumgrass, S. Schefer-Wenzl, M. Strembeck: Deriving Process-Related RBAC Models from Process Execution Histories, In: Proc. of the 4th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE), Izmir, Turkey, July 2012 (ps, pdf, extended version)
A. Baumgrass, T. Baier, J. Mendling, M. Strembeck: Conformance Checking of RBAC Policies in Process-Aware Information Systems, In: Proc. of the Workshop on Workflow Security Audit and Certification (WfSAC), Lecture Notes in Business Information Processing (LNBIP), Vol. 100, Springer Verlag, Clermont-Ferrand, France, August 2011 (ps, pdf)
W. Hummer, P. Gaubatz, M. Strembeck, U. Zdun, S. Dustdar: An Integrated Approach for Identity and Access Management in a SOA Context, In: Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), Innsbruck, Austria, June 2011 (ps, pdf)
A. Baumgrass, M. Strembeck, S. Rinderle-Ma: Deriving Role Engineering Artifacts from Business Processes and Scenario Models, In: Proc. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT), Innsbruck, Austria, June 2011 (ps, pdf, extended version)
M. Strembeck, J. Mendling: Modeling Process-related RBAC Models with Extended UML Activity Models, In: Information and Software Technology, Vol. 53, No. 5, May 2011 (doi, pdf)
M. Strembeck, J. Mendling: Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context, In: Proc. of the 18th International Conference on Cooperative Information Systems (CoopIS), Lecture Notes in Computer Science (LNCS), Vol. 6426, Springer Verlag, Crete, Greece, October 2010 (ps, pdf, extended version)
S. Kunz, S. Evdokimov, B. Fabian, B. Stieger, M. Strembeck: Role-Based Access Control for Information Federations in the Industrial Service Sector In: Proc. of the 18th European Conference on Information Systems (ECIS), Pretoria, South Africa, June 2010 (ps, pdf)
M. Strembeck: Scenario-Driven Role Engineering, In: IEEE Security & Privacy, Vol. 8, No. 1, January/February 2010 (doi, pdf)
J. Mendling, K. Ploesser, M. Strembeck: Specifying Separation of Duty Constraints in BPEL4People Processes, In: Proc. of the 11th International Conference on Business Information Systems (BIS), Lecture Notes in Business Information Processing (LNBIP), Vol. 7, Springer Verlag, Innsbruck, Austria, May 2008 (ps, pdf)
G. Stermsek, M. Strembeck, G. Neumann: A User Profile Derivation Approach based on Log-File Analysis, In: Proc.of the International Conference on Information and Knowledge Engineering (IKE), Las Vegas, NV, USA, June 2007 (ps, pdf)
M. Strembeck: A Role Engineering Tool for Role-Based Access Control, In: Proc. of the 3rd Symposium on Requirements Engineering for Information Security (SREIS), Paris, France, August 2005 (ps, pdf)
M. Strembeck: Embedding Policy Rules for Software-Based Systems in a Requirements Context, In: Proc. of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), Stockholm, Sweden, June 2005 (ps, pdf)
M. Strembeck, G. Neumann: An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments, In: ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 3, August 2004 (doi, pdf)
J. Mendling, M. Strembeck, G. Stermsek, G. Neumann: An Approach to Extract RBAC Models from BPEL4WS Processes, In: Proc. of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), Modena, Italy, June 2004 (ps, pdf)
G. Neumann, M. Strembeck: A Scenario-driven Role Engineering Process for Functional RBAC Roles, In: Proc. of 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, USA, June 2002 (ps, pdf)

Download:

Contact:

Mark Strembeck
Mark Strembeck