메뉴 건너뛰기




Volumn , Issue , 2011, Pages 108-117

Comprehensive two-level analysis of static and dynamic RBAC constraints with UML and OCL

Author keywords

Analysis; Modeling; RBAC; Reliability; Security; UML OCL

Indexed keywords

ACCESS RIGHTS; ANALYSIS; AUTHORIZATION CONSTRAINTS; CONFIGURABLE; DOMAIN SPECIFIC LANGUAGES; RBAC; RBAC POLICY; ROLE-BASED ACCESS CONTROL; SECURITY; SECURITY POLICY; SECURITY REQUIREMENTS; STATIC AND DYNAMIC; TIME-DEPENDENT; TOOL SUPPORT; UML/OCL; VALIDATION TOOLS; VISUAL REPRESENTATIONS;

EID: 80052926621     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSIRI.2011.18     Document Type: Conference Paper
Times cited : (17)

References (29)
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1) (1999) 65-104.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • Furbach, U. Shankar, N. eds.:, Volume 4130 of Lecture Notes in Computer Science. Springer
    • Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Specifying and Reasoning About Dynamic Access-Control Policies. In Furbach, U., Shankar, N., eds.: IJCAR. Volume 4130 of Lecture Notes in Computer Science., Springer (2006) 632-646.
    • (2006) IJCAR , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 11
    • 38049040380 scopus 로고    scopus 로고
    • A policy language for distributed usage control
    • Biskup, J. Lopez, J. eds.:, Volume 4734 of Lecture Notes in Computer Science. Springer
    • Hilty, M., Pretschner, A., Basin, D.A., Schaefer, C., Walter, T.: A Policy Language for Distributed Usage Control. In Biskup, J., Lopez, J., eds.: ESORICS. Volume 4734 of Lecture Notes in Computer Science., Springer (2007) 531-546.
    • (2007) ESORICS , pp. 531-546
    • Hilty, M.1    Pretschner, A.2    Basin, D.A.3    Schaefer, C.4    Walter, T.5
  • 15
    • 36048931368 scopus 로고    scopus 로고
    • USE: A UML-based specification environment for validating UML and OCL
    • Gogolla, M., Büttner, F., Richters, M.: USE: A UML-Based Specification Environment for Validating UML and OCL. Science of Computer Programming 69 (2007) 27-34.
    • (2007) Science of Computer Programming , vol.69 , pp. 27-34
    • Gogolla, M.1    Büttner, F.2    Richters, M.3
  • 19
    • 37549046448 scopus 로고    scopus 로고
    • Modeling and validating mondex scenarios described in UML and OCL with USE
    • Kuhlmann, M., Gogolla, M.: Modeling and Validating Mondex Scenarios Described in UML and OCL with USE. Formal Aspects of Computing 20(1) (2008) 79-100.
    • (2008) Formal Aspects of Computing , vol.20 , Issue.1 , pp. 79-100
    • Kuhlmann, M.1    Gogolla, M.2
  • 22
    • 70350378886 scopus 로고    scopus 로고
    • Consistency, independence and consequences in UML and OCL Models
    • Springer, Berlin, LNCS 5668
    • Gogolla, M., Kuhlmann, M., Hamann, L.: Consistency, Independence and Consequences in UML and OCL Models. In: Proc. 3rd Int. Conf. Test and Proof (TAP'2009), Springer, Berlin, LNCS 5668 (2009) 90-104.
    • (2009) Proc. 3rd Int. Conf. Test and Proof (TAP'2009) , pp. 90-104
    • Gogolla, M.1    Kuhlmann, M.2    Hamann, L.3
  • 23
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • Jürjens, J.: UMLsec: Extending UML for secure systems development. Lecture Notes in Computer Science 2460 (2002) 412-425.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 27
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol 15(1) (2006) 39-91.
    • (2006) ACM Trans. Softw. Eng. Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.