메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 115-124

Using UML to visualize role-based access control constraints

Author keywords

Modeling; RBAC; UML

Indexed keywords

COMPUTER OPERATING SYSTEMS; CONSTRAINT THEORY; FORMAL LOGIC; HIGH LEVEL LANGUAGES; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PARAMETER ESTIMATION; PROBLEM SOLVING; PUBLIC POLICY;

EID: 4143147399     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990054     Document Type: Conference Paper
Times cited : (88)

References (31)
  • 12
    • 0344001283 scopus 로고    scopus 로고
    • Providing policy-neutral and transparent access control in extensible systems
    • University of Washington
    • R. Grimm and B. Bershad. Providing Policy-Neutral and Transparent Access Control in Extensible Systems. Technical Report UW-CSE-98-02-02, University of Washington, 1998.
    • (1998) Technical Report , vol.UW-CSE-98-02-02
    • Grimm, R.1    Bershad, B.2
  • 15
    • 1542597501 scopus 로고    scopus 로고
    • Security policy specification using a graphical approach
    • Computer Science Department, University of California Davis, July
    • J. A. Hoagland, R. Pandey, and K. N. Levitt. Security Policy Specification Using a Graphical Approach. Technical Report CSE-98-3, Computer Science Department, University of California Davis, July 1998.
    • (1998) Technical Report , vol.CSE-98-3
    • Hoagland, J.A.1    Pandey, R.2    Levitt, K.N.3
  • 22
    • 1942475563 scopus 로고    scopus 로고
    • XACML language proposal, version 0.8
    • Organization for the Advancement of Structured Information Standards, January
    • OASIS. XACML Language Proposal, Version 0.8. Technical report, Organization for the Advancement of Structured Information Standards, January 2002. Available electronically from http://www.oasis-open.org/committees/xacml.
    • (2002) Technical Report
  • 23
    • 35248896164 scopus 로고    scopus 로고
    • A flexible method for information systems security policy specification
    • Louvain-la-Neuve, Belgium, Springer-Verlag
    • R. Ortalo. A Flexible Method for Information Systems Security Policy Specification. In Proceedings of the 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
    • (1998) Proceedings of the 5th European Symposium on Research in Computer Security
    • Ortalo, R.1
  • 27
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 28
    • 1942539528 scopus 로고    scopus 로고
    • Improving the security, scalability, manageability and performance of system services for network computing
    • University of Washington, September
    • E. G. Sirer, R. Grimm, A. J. Gregory, N. R. Anderson, and B. N. Bershad. Improving the security, scalability, manageability and performance of system services for network computing. Technical Report UW-CSE-98-09-01, University of Washington, September 1998.
    • (1998) Technical Report , vol.UW-CSE-98-09-01
    • Sirer, E.G.1    Grimm, R.2    Gregory, A.J.3    Anderson, N.R.4    Bershad, B.N.5
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.