Detecting Conflicts of Interest
暂无分享,去创建一个
[1] Morris Sloman,et al. Policy Conflict Analysis in Distributed System Management , 1994 .
[2] Gail-Joon Ahn,et al. UML-based representation of role-based access control , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[3] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[4] Emil C. Lupu,et al. Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..
[5] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[6] Indrakshi Ray,et al. Using uml to visualize role-based access control constraints , 2004, SACMAT '04.
[7] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[8] Axel van Lamsweerde,et al. Managing Conflicts in Goal-Driven Requirements Engineering , 1998, IEEE Trans. Software Eng..
[9] Pietro Trimarchi,et al. Istituzioni di diritto privato , 1989 .
[10] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[11] Alessandra Russo,et al. Using event calculus to formalise policy specification and analysis , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.