Integrating access control policy specification into the software development process
暂无分享,去创建一个
[1] Donald F. Towsley,et al. Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination , 2005, Int. J. Electron. Gov. Res..
[2] Nicodemos Constantinou Damianou,et al. A policy framework for management of distributed systems , 2002 .
[3] Maarten Marx,et al. Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.
[4] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[5] E. B. Fernandez,et al. Determining role rights from use cases , 1997, RBAC '97.
[6] Daniel Jackson,et al. Alloy: a lightweight object modelling notation , 2002, TSEM.
[7] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[8] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Eric S. K. Yu,et al. Modeling organizations for information systems requirements engineering , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.
[10] Ian F. Alexander,et al. Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..
[11] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[12] Sushil Jajodia,et al. Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.
[13] Bashar Nuseibeh,et al. Core Security Requirements Artefacts , 2004 .
[14] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[15] Morris Sloman,et al. Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..
[16] R. H. Franke,et al. The Hawthorne experiments: First statistical interpretation. , 1978 .
[17] S. Siegel,et al. Nonparametric Statistics for the Behavioral Sciences , 2022, The SAGE Encyclopedia of Research Design.
[18] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[19] Bashar Nuseibeh,et al. Modelling access policies using roles in requirements engineering , 2003, Inf. Softw. Technol..
[20] Mark Strembeck,et al. A scenario-driven role engineering process for functional RBAC roles , 2002, SACMAT '02.