메뉴 건너뛰기




Volumn 10 LNICST, Issue , 2009, Pages 461-471

Supporting agile development of authorization rules for SME applications

Author keywords

Agile security engineering; Authorization policy; DSL; End user development; SME applications

Indexed keywords

AGILE DEVELOPMENT; AGILE METHODOLOGIES; AGILE SECURITY; AUTHORIZATION POLICY; AUTHORIZATION RULES; DOMAIN EXPERTS; END-USER DEVELOPMENT; END-USER INVOLVEMENTS; PLUG-INS; RUBY ON RAILS; SECURITY ENGINEERING; SME APPLICATIONS; WEB APPLICATION; WORKFLOW APPLICATIONS;

EID: 79551558962     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-03354-4_35     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 2
    • 21144450607 scopus 로고    scopus 로고
    • ANSI INCITS 359-2004. American Nat'l Standard for Information Technology
    • ANSI INCITS 359-2004. Role-Based Access Control. American Nat'l Standard for Information Technology (2004)
    • (2004) Role-Based Access Control
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 5
    • 26444465547 scopus 로고    scopus 로고
    • Agile security using an incremental security architecture
    • Extreme Programming and Agile Processes in Software Engineering: 6th International Conference, XP 2005. Proceedings
    • Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005) (Pubitemid 41424950)
    • (2005) Lecture Notes in Computer Science , vol.3556 , pp. 57-65
    • Chivers, H.1    Paige, R.F.2    Ge, X.3
  • 6
    • 77952404110 scopus 로고    scopus 로고
    • End user security: The democratisation of security usability
    • Church, L.: End user security: The democratisation of security usability. In: Security and Human Behaviour (2008)
    • (2008) Security and Human Behaviour
    • Church, L.1
  • 10
    • 38149102523 scopus 로고    scopus 로고
    • Extreme programming security practices
    • Concas, G., Damiani, E., Scotto, M., Succi, G. (eds.). Springer, Heidelberg
    • Ge, X., Paige, R.F., Polack, F., Brooke, P.J.: Extreme programming security practices. In: Concas, G., Damiani, E., Scotto, M., Succi, G. (eds.) XP 2007. LNCS, vol. 4536, pp. 226-230. Springer, Heidelberg (2007)
    • (2007) XP 2007. LNCS , vol.4536 , pp. 226-230
    • Ge, X.1    Paige, R.F.2    Polack, F.3    Brooke, P.J.4
  • 11
    • 34248340450 scopus 로고    scopus 로고
    • Towards agile security in web applications
    • DOI 10.1145/1176617.1176727, 1176727, Companion to the 21st ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications, OOPSLA 2006
    • Kongsli, V.: Towards agile security in web applications. In: OOPSLA 2006: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, pp. 805-808. ACM, New York (2006) (Pubitemid 46729405)
    • (2006) Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA , vol.2006 , pp. 805-808
    • Kongsli, V.1
  • 14
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Oh, S., Park, S.: Task-role-based access control model. Inf. Syst. 28(6), 533-562 (2003)
    • (2003) Inf. Syst. , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 17
    • 33847756784 scopus 로고    scopus 로고
    • Agile security testing of web-based systems via HTTPUnit
    • DOI 10.1109/ADC.2005.11, 1609802, Proceedings - AGILE Confernce 2005
    • Tappenden, A., Beatty, P., Miller, J.: Agile security testing of web-based systems via httpunit. In: AGILE, pp. 29-38. IEEE Computer Society Press, Los Alamitos (2005) (Pubitemid 46379839)
    • (2005) Proceedings - AGILE Confernce 2005 , vol.2005 , pp. 29-38
    • Tappenden, A.1    Beatty, P.2    Miller, J.3    Geras, A.4    Smith, M.5
  • 18
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management
    • London, UK, Chapman & Hall, Ltd., Boca Raton
    • Thomas, R.K., Sandhu, R.S.: Thomas and Ravi S. Sandhu. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented autorization management. In: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, London, UK, pp. 166-181. Chapman & Hall, Ltd., Boca Raton (1998)
    • (1998) Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2    Thomas3    Sandhu, R.S.4
  • 19
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC - A workflow security model incorporating controlled overriding of constraints
    • DOI 10.1142/S0218843003000814
    • Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst. 12(4), 455-485 (2003) (Pubitemid 38000660)
    • (2003) International Journal of Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.