19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Computer Security – ESORICS 2005 

      Specification and Validation of Authorisation Constraints Using UML and OCL

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references16

          • Record: found
          • Abstract: not found
          • Article: not found

          Role-based access control models

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A Comparison of Commercial and Military Computer Security Policies

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Validating UML Models and OCL Constraints

                Bookmark

                Author and book information

                Book Chapter
                2005
                : 64-79
                10.1007/11555827_5
                a1303055-d5cf-4192-bd27-2f50735edcc3
                History

                Comments

                Comment on this book

                Book chapters

                Similar content5,753

                Cited by1