Integrating access control policy specification into the software development process

[1]  Donald F. Towsley,et al.  Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination , 2005, Int. J. Electron. Gov. Res..

[2]  Nicodemos Constantinou Damianou,et al.  A policy framework for management of distributed systems , 2002 .

[3]  Maarten Marx,et al.  Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.

[4]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[5]  E. B. Fernandez,et al.  Determining role rights from use cases , 1997, RBAC '97.

[6]  Daniel Jackson,et al.  Alloy: a lightweight object modelling notation , 2002, TSEM.

[7]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[8]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[9]  Eric S. K. Yu,et al.  Modeling organizations for information systems requirements engineering , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.

[10]  Ian F. Alexander,et al.  Misuse Cases: Use Cases with Hostile Intent , 2003, IEEE Softw..

[11]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[12]  Sushil Jajodia,et al.  Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.

[13]  Bashar Nuseibeh,et al.  Core Security Requirements Artefacts , 2004 .

[14]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[15]  Morris Sloman,et al.  Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..

[16]  R. H. Franke,et al.  The Hawthorne experiments: First statistical interpretation. , 1978 .

[17]  S. Siegel,et al.  Nonparametric Statistics for the Behavioral Sciences , 2022, The SAGE Encyclopedia of Research Design.

[18]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[19]  Bashar Nuseibeh,et al.  Modelling access policies using roles in requirements engineering , 2003, Inf. Softw. Technol..

[20]  Mark Strembeck,et al.  A scenario-driven role engineering process for functional RBAC roles , 2002, SACMAT '02.