Modelling access policies using roles in requirements engineering
- 1 November 2003
- journal article
- Published by Elsevier in Information and Software Technology
- Vol. 45 (14) , 979-991
- https://doi.org/10.1016/s0950-5849(03)00097-1
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Framework for role-based delegation modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Flexible team-based access control using contextsPublished by Association for Computing Machinery (ACM) ,2001
- Securing context-aware applications using environment rolesPublished by Association for Computing Machinery (ACM) ,2001
- Translating Role-Based Access Control Policy within ContextPublished by Springer Nature ,2001
- The NIST model for role-based access controlPublished by Association for Computing Machinery (ACM) ,2000
- TRBACPublished by Association for Computing Machinery (ACM) ,2000
- Control principles and role hierarchiesPublished by Association for Computing Machinery (ACM) ,1998
- How to do discretionary access control using rolesPublished by Association for Computing Machinery (ACM) ,1998
- Team-based access control (TMAC)Published by Association for Computing Machinery (ACM) ,1997
- Role-based access control modelsComputer, 1996