Attribute Mutability in Usage Control, 18th IFIP WG 11.3 Working Conference on Data and Applications Security, 2004. ,
DOI : 10.1007/1-4020-8128-6_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.2342
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, pp.351-387, 2005. ,
DOI : 10.1145/1108906.1108908
Role engineering: from design to evaluation of security schemas, Journal of Systems and Software, vol.8, p.81 ,
Conception approach of access control in??heterogeneous??information systems using UML, Telecommunication Systems, vol.81, issue.9, pp.177-190, 2010. ,
DOI : 10.1109/2.485845
A scenario-driven role engineering process for functional RBAC roles, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507717
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1495
Scenario-Driven Role Engineering, IEEE Security & Privacy Magazine, vol.8, issue.1, 2010. ,
DOI : 10.1109/MSP.2010.46
An integrated approach to engineer and enforce context constraints in RBAC environments, ACM Transactions on Information and System Security, vol.7, issue.3, 2004. ,
DOI : 10.1145/1015040.1015043
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.7854
The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1 ,
DOI : 10.1145/300830.300837
Determining role rights from use cases, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997. ,
DOI : 10.1145/266741.266767
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.5696
Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, p.3991, 2006. ,
DOI : 10.1145/1125808.1125810
Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1996. ,
DOI : 10.1145/270152.270159
Towards a UML based approach to role engineering, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, 1999. ,
DOI : 10.1145/319171.319184
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.4070
Engineering of Role-Permission Assignment to Role Engineering, Proc. of 17th ACSAC, 2001. ,
Process-oriented approach for rolefinding to implement role-based security administration in a large industrial organization, Proc. of ACM Workshop on role-Based Access Control, 2000. ,
Implementation of Access Control Model for Distributed Information Systems Using Usage Control, SIIS 2011, 2011. ,
DOI : 10.1145/1108906.1108908
Administration of access control in information systems using URBAC model, Journal of Applied Computer Science, vol.19, issue.2, 2011. ,