Login / Signup
Exploiting use case slices for modeling access control policies.
Satish Srinivasan
Cobra Rahmani
Mansour Zand
Published in:
Software Engineering Research and Practice (2009)
Keyphrases
</>
access control policies
access control
conflict resolution
trust negotiation
fine grained
management system
supply chain
data mining techniques