Security requirements of a software product need to receive attention throughout its development life cycle. This paper proposes several design artifacts that specify the details of access control policies formally and precisely in the requirement and analysis phases. The work is based on extending the use cases in Unified Modeling Language, with access control schemas and tables. In addition, we propose a methodology to resolve several issues such as consistency and completeness of access control specifications that are not totally resolved before. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Alghathbar, K., & Wijesekera, D. (2003). Consistent and complete access control policies in use cases. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2863, 373–387. https://doi.org/10.1007/978-3-540-45221-8_32
Mendeley helps you to discover research relevant for your work.