메뉴 건너뛰기




Volumn 144, Issue , 2004, Pages 189-204

RBAC/MAC security for UML

Author keywords

[No Author keywords available]

Indexed keywords

GRAPHIC METHODS; SOFTWARE DESIGN; UNIFIED MODELING LANGUAGE;

EID: 80053570407     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8128-6_13     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 2
    • 20444445343 scopus 로고    scopus 로고
    • Consistent and Complete Access Control Policies in Use Cases
    • San Francisco, CA, LNCS
    • K. Alghathbar and D. Wijesekera. "Consistent and Complete Access Control Policies in Use Cases." Proc. of UML 2003, San Francisco, CA, LNCS, 2003.
    • (2003) Proc. of UML 2003
    • Alghathbar, K.1    Wijesekera, D.2
  • 3
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations Model
    • Mitre Corp., Bedford, MA
    • D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations Model. M74-244, Mitre Corp., Bedford, MA, 1975.
    • (1975) M74-244
    • Bell, D.1    Lapadula, L.2
  • 4
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computer Systems
    • Mitre Corp., Bedford, MA
    • K. Biba. Integrity Considerations for Secure Computer Systems. TR-3153, Mitre Corp., Bedford, MA, 1977.
    • (1977) TR-3153
    • Biba, K.1
  • 7
    • 0031361985 scopus 로고    scopus 로고
    • Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications
    • S. Demurjian and T.C. Ting. "Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications." Journal of Computer Security, 5(4), 1997.
    • (1997) Journal of Computer Security , vol.5 , Issue.4
    • Demurjian, S.1    Ting, T.C.2
  • 10
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • D. F. Ferraiolo, et al. "Proposed NIST standard for role-based access control." ACM TOIS. 4(3), Aug. 2001.
    • (2001) ACM TOIS , vol.4 , Issue.3
    • Ferraiolo, D.F.1
  • 12
    • 0242403961 scopus 로고    scopus 로고
    • UMLsec: Extending UML for Secure Systems Development
    • Dresden, LNCS
    • J. Jurjens. "UMLsec: Extending UML for Secure Systems Development." Proc. of UML 2002, Dresden, LNCS, 2002.
    • (2002) Proc. of UML 2002
    • Jurjens, J.1
  • 13
    • 0242655790 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • Dresden, LNCS
    • T. Lodderstedt, D. Basin and J. Doser. "SecureUML: A UML-Based Modeling Language for Model-Driven Security." Proc. of UML 2002, Dresden, LNCS, 2002.
    • (2002) Proc. of UML 2002
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 15
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • May
    • S. Osborn, et al. "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies." ACM TOIS. 3 (2), May 2000.
    • (2000) ACM TOIS , vol.3 , Issue.2
    • Osborn, S.1
  • 20
    • 0242528829 scopus 로고
    • A User-Role Based Data Security Approach
    • C. Landwehr (ed.), North-Holland
    • T.C. Ting. "A User-Role Based Data Security Approach." Database Security: Status and Prospects, C. Landwehr (ed.), North-Holland, 1988.
    • (1988) Database Security: Status and Prospects
    • Ting, T.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.