Delegation of obligations
暂无分享,去创建一个
[1] John Dobson,et al. New security paradigms: what other concepts do we need as well? , 1993, NSPW '92-93.
[2] Daniel Jackson,et al. Alloy: a lightweight object modelling notation , 2002, TSEM.
[3] Michael Butler,et al. Combining B and Alloy , 2001 .
[4] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[5] Morris Sloman,et al. Policy Conflict Analysis in Distributed System Management , 1994 .
[6] Jonathan P. Bowen,et al. ZB 2002:Formal Specification and Development in Z and B , 2002, Lecture Notes in Computer Science.
[7] Gill Christy,et al. Management and Organisational Behaviour , 1985 .
[8] John Derrick,et al. Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification , 2001, POLICY.
[9] Michael J. Butler,et al. An Approach to Combining B and Alloy , 2002, ZB.
[10] Anneke Kleppe,et al. The object constraint language: precise modeling with UML , 1998 .
[11] Manu Sridharan,et al. A micromodularity mechanism , 2001, ESEC/FSE-9.
[12] John E. Dobson,et al. A framework for expressing models of security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[13] Daniel Jackson,et al. Alcoa: the Alloy constraint analyzer , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[14] Morris Sloman,et al. The source of authority for commercial access control , 1988, Computer.
[15] Emil C. Lupu,et al. Ponder: A Language for Specifying Security and Management Policies for Distributed Systems , 2000 .
[16] Daniel Jackson,et al. Micromodels of software: lightweight modelling and analysis with Alloy , 2002 .
[17] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[18] L. Urwick. Notes on the theory of organization , 1952 .