Security constraints in modeling of access control rules for dynamic information systems

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Rapid development of new technologies brings with it a need for the new security solutions. Identifying, defining and implementing of security constraints is an important part of the process of modeling and developing of application/information systems and its administration. The paper presents the issue of security constraints of information system from the point of view of Usage Role-based Access Control approach-it deals with the classification of constraints and their implementation in the process of modeling the access rules for dynamic information systems. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Poniszewska-Maranda, A. (2014). Security constraints in modeling of access control rules for dynamic information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8327 LNCS, pp. 466–477). Springer Verlag. https://doi.org/10.1007/978-3-319-04298-5_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free