Role-based authorization constraints specification, ACM Transactions on Information and System Security, vol.3, issue.4, pp.207-226, 2010. ,
DOI : 10.1145/382912.382913
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.3419
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC, 23rd Annual IFIP Working Conference on Data and Applications Security, 2009. ,
DOI : 10.1145/1057977.1057979
The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1, pp.65-104, 1999. ,
DOI : 10.1145/300830.300837
An Introduction to Object-Oriented Programming, 1997. ,
Role-Based access control consistency validation, Proceedings of the 2006 international symposium on Software testing and analysis , ISSTA'06, 2006. ,
DOI : 10.1145/1146238.1146253
A model and typology of collaboration between professionals in healthcare organizations, BMC Health Services Research, 2008. ,
Secure Systems Development with UML, SpringerVerlag, 2003. ,
On mutually exclusive roles and separation-ofduty, ACM Transaction of Information System Security, 2007. ,
DOI : 10.1145/1237500.1237501
A framework of composable access control features: Preserving separation of access control concerns from models to code Special issue on software engineering for secure systems, Science Direct, vol.29, pp.350-379, 2010. ,
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Flexible Workflow Incorporated with RBAC, Proceedings of the 9th International Conference on Computer Supported Cooperative Work, pp.525-534, 2005. ,
DOI : 10.1007/11686699_53
A Meta-Model Based Approach to UML Modelling, Tenth International Conference on Computer Modeling and Simulation (uksim 2008), pp.667-672, 2008. ,
DOI : 10.1109/UKSIM.2008.60
Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997. ,
DOI : 10.1145/266741.266748
Role-based access control (RBAC) in Java via proxy objects using annotations, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, 2010. ,
DOI : 10.1145/1809842.1809858