메뉴 건너뛰기




Volumn 31, Issue 3, 2012, Pages 299-314

A methodology for integrating access control policies within database development

Author keywords

Access control; ADOM; Authorization; Database design; Domain analysis; FOOM; Security; Security patterns; UML

Indexed keywords

ADOM; AUTHORIZATION; DATABASE DESIGN; DOMAIN ANALYSIS; FOOM; SECURITY; SECURITY PATTERNS; UML;

EID: 84859434803     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.01.004     Document Type: Article
Times cited : (17)

References (37)
  • 1
    • 84890716484 scopus 로고    scopus 로고
    • Tool support for enforcing security policies on databases
    • CEUR-WS
    • J. Abramov, O. Anson, A. Sturm, and P. Shoval Tool support for enforcing security policies on databases CAiSE Forum 2011 41 48 CEUR-WS
    • (2011) CAiSE Forum , pp. 41-48
    • Abramov, J.1    Anson, O.2    Sturm, A.3    Shoval, P.4
  • 4
    • 33751113935 scopus 로고    scopus 로고
    • Validating the enforcement of access control policies and separation of duty principle in requirement engineering
    • DOI 10.1016/j.infsof.2006.03.009, PII S0950584906000450
    • K. Alghathbar Validating the enforcement of access control policies and separation of duty principle in requirement engineering Information & Software Technology 49 2007 142 157 (Pubitemid 44765201)
    • (2007) Information and Software Technology , vol.49 , Issue.2 , pp. 142-157
    • Alghathbar, K.1
  • 7
    • 0028428376 scopus 로고
    • Converting OO models into RDBMS schema
    • M. Blaha, W. Premerlani, and H. Shen Converting OO models into RDBMS schema IEEE Software 11 1994 28 39
    • (1994) IEEE Software , vol.11 , pp. 28-39
    • Blaha, M.1    Premerlani, W.2    Shen, H.3
  • 12
    • 16344386616 scopus 로고    scopus 로고
    • Designing secure databases
    • DOI 10.1016/j.infsof.2004.09.013, PII S0950584904001429
    • E. Fernández-Medina, and M. Piattini Designing secure databases Information & Software Technology 47 7 2005 463 477 (Pubitemid 40466991)
    • (2005) Information and Software Technology , vol.47 , Issue.7 , pp. 463-477
    • Fernandez-Medina, E.1    Piattini, M.2
  • 14
    • 77954026152 scopus 로고    scopus 로고
    • Separating application and security concerns in use case models
    • ACM
    • H. Gomaa, and M.E. Shin Separating application and security concerns in use case models 15th workshop on Earlt aspects 2009 ACM 1 6
    • (2009) 15th Workshop on Earlt Aspects , pp. 1-6
    • Gomaa, H.1    Shin, M.E.2
  • 20
    • 37849187634 scopus 로고    scopus 로고
    • UML specification of access control policies and their formal verification
    • DOI 10.1007/s10270-006-0030-z
    • M. Koch, and F. Parisi-Presicce UML specification of access control policies and their formal verification Software and System Modeling 5 2006 429 447 (Pubitemid 44824555)
    • (2006) Software and Systems Modeling , vol.5 , Issue.4 , pp. 429-447
    • Koch, M.1    Parisi-Presicce, F.2
  • 23
  • 24
    • 84907324157 scopus 로고    scopus 로고
    • OMG version 2.2,; [last accessed: December 2010]
    • OMG. Object constraint language, version 2.2, http://www.omg.org/spec/ OCL/2.2/; [last accessed: December 2010].
    • Object Constraint Language
  • 25
    • 84859432536 scopus 로고    scopus 로고
    • [last accessed: December 2011]
    • Oracle: Oracle@database - security guide, http://download.oracle.com/ docs/cd/B28359-01/network.111/b28531.pdf; [last accessed: December 2011].
    • Oracle: Oracle@database - Security Guide
  • 26
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Computers & Security 29 2010 350 379
    • (2010) Computers & Security , vol.29 , pp. 350-379
    • Pavlich-Mariscal, J.A.1    Demurjian, S.A.2    Michel, L.D.3
  • 29
    • 67349109419 scopus 로고    scopus 로고
    • Utilizing domain models for application design and validation
    • I. Reinhartz-Berger, and A. Sturm Utilizing domain models for application design and validation Information & Software Technology 51 2009 1275 1289
    • (2009) Information & Software Technology , vol.51 , pp. 1275-1289
    • Reinhartz-Berger, I.1    Sturm, A.2
  • 32
    • 0141725660 scopus 로고    scopus 로고
    • The pragmatics of model-driven development. Software
    • B. Selic The pragmatics of model-driven development. Software IEEE software 20 5 2003 19 25
    • (2003) IEEE Software , vol.20 , Issue.5 , pp. 19-25
    • Selic, B.1
  • 33
    • 0023862401 scopus 로고
    • ADISSA: Architectural design of information systems based on structured analysis
    • DOI 10.1016/0306-4379(88)90016-6
    • P. Shoval ADISSA: architectural design of information systems based on structured analysis Information Systems 13 1988 193 210 (Pubitemid 18650393)
    • (1988) Information Systems , vol.13 , Issue.2 , pp. 193-210
    • Shoval Peretz1
  • 35
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engieering 10 1 2005 34 44
    • (2005) Requirements Engieering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 36
    • 84940436173 scopus 로고    scopus 로고
    • [last accessed: December 2010]
    • StringTemplate, http://www.stringtemplate.org/; [last accessed: December 2010].
    • StringTemplate
  • 37
    • 84859424170 scopus 로고    scopus 로고
    • [last accessed: December 2010]
    • TOPCASED, www.topcased.org; [last accessed: December 2010].
    • Topcased


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.