메뉴 건너뛰기




Volumn 84, Issue 12, 2011, Pages 2035-2052

A feature-based approach for modeling role-based access control systems

Author keywords

Feature modeling; Role based access control; UML

Indexed keywords

ACCESS CONTROL MODELS; CONFIGURATION RULES; DESIGN PRINCIPLES; ENTERPRISE SYSTEM; FEATURE MODELING; FEATURE-BASED; ROLE-BASED ACCESS CONTROL; SYSTEM DEVELOPMENT; TOOL SUPPORT; UML; UML MODELING;

EID: 80053564799     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.03.084     Document Type: Article
Times cited : (16)

References (51)
  • 8
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computer Systems
    • Bedford, MA. Air Force Electronic Systems Division
    • Biba, K.J.; 1977. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, Bedford, MA. Air Force Electronic Systems Division.
    • (1977) Technical Report ESD-TR-76-372
    • Biba, K.J.1
  • 13
    • 77949877703 scopus 로고    scopus 로고
    • Cardinality-based feature modeling and constraints: A progress report
    • San Diego, California
    • Czarnecki, K.; Kim, C.H.P.; 2005. Cardinality-based feature modeling and constraints: a progress report. In: Proceedings of International Workshop on Software Factories, San Diego, California. http://www.ece.uwaterloo.ca/kczarnec/ sf05.pdf.
    • (2005) Proceedings of International Workshop on Software Factories
    • Czarnecki, K.1    Kim C. .H., .P.2
  • 22
    • 30144433198 scopus 로고    scopus 로고
    • Privacy Enforcement with an Extended Role-Based Access Control Model
    • North Carolina State University, Raleigh, NC
    • He, Q.; 2003. Privacy Enforcement with an Extended Role-Based Access Control Model. Technical Report TR-2003-09, Computer Science Department, North Carolina State University, Raleigh, NC.
    • (2003) Technical Report TR-2003-09, Computer Science Department
    • He, Q.1
  • 25
    • 80053574665 scopus 로고    scopus 로고
    • A Modeling Approach to Configurable Role-Based Access Control
    • June Oakland University, Rochester, MI
    • Kim, D.; Lu, L.; Kim, S.; June 2009. A Modeling Approach to Configurable Role-Based Access Control. Technical Report CSE-09-TR-0601, CSE Department, Oakland University, Rochester, MI.
    • (2009) Technical Report CSE-09-TR-0601, CSE Department
    • Kim, D.1    Lu, L.2    Kim, S.3
  • 28
    • 67949108025 scopus 로고    scopus 로고
    • Quality-driven architecture development using architectural tactics
    • S. Kim, D. Kim, L. Lu, and S. Park Quality-driven architecture development using architectural tactics Journal of Systems and Software 82 8 2009 1211 1231
    • (2009) Journal of Systems and Software , vol.82 , Issue.8 , pp. 1211-1231
    • Kim, S.1    Kim, D.2    Lu, L.3    Park, S.4
  • 31
    • 15944413918 scopus 로고    scopus 로고
    • Context sensitivity in role-based access control
    • DOI 10.1145/567331.567336
    • A. Kumar, N.M. Karnik, and G. Chafle Context sensitivity in role-based access control ACM SIGPOS Operating Systems Review 36 3 2002 53 66 (Pubitemid 41107669)
    • (2002) Operating Systems Review (ACM) , vol.36 , Issue.3 , pp. 53-66
    • Kumar, A.1    Karnik, N.2    Chafle, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.