Consistent and complete access control policies in use cases

10Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security requirements of a software product need to receive attention throughout its development life cycle. This paper proposes several design artifacts that specify the details of access control policies formally and precisely in the requirement and analysis phases. The work is based on extending the use cases in Unified Modeling Language, with access control schemas and tables. In addition, we propose a methodology to resolve several issues such as consistency and completeness of access control specifications that are not totally resolved before. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Alghathbar, K., & Wijesekera, D. (2003). Consistent and complete access control policies in use cases. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2863, 373–387. https://doi.org/10.1007/978-3-540-45221-8_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free