A flexible method for information system security policy specification
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Specifying a security policy: a case studyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Analyzing consistency of security policiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Amulet environment: new models for effective user interface software developmentIEEE Transactions on Software Engineering, 1997
- Role-based access control modelsComputer, 1996
- Formal specification of security requirements using the theory of normative positionsPublished by Springer Nature ,1992
- TABLEAUX: A general theorem prover for modal logicsJournal of Automated Reasoning, 1991
- First-order modal tableauxJournal of Automated Reasoning, 1988
- Logic programming with setsPublished by Association for Computing Machinery (ACM) ,1987
- Modal LogicPublished by Cambridge University Press (CUP) ,1980
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976