Rapid development of new technologies brings with it a need for the new security solutions. Identifying, defining and implementing of security constraints is an important part of the process of modeling and developing of application/information systems and its administration. The paper presents the issue of security constraints of information system from the point of view of Usage Role-based Access Control approach-it deals with the classification of constraints and their implementation in the process of modeling the access rules for dynamic information systems. © 2014 Springer International Publishing Switzerland.
CITATION STYLE
Poniszewska-Maranda, A. (2014). Security constraints in modeling of access control rules for dynamic information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8327 LNCS, pp. 466–477). Springer Verlag. https://doi.org/10.1007/978-3-319-04298-5_41
Mendeley helps you to discover research relevant for your work.