Specification of role and attribute transitions for secure information system access.
Mark EveredPublished in: DICTAP (2012)
Keyphrases
- information systems
- access control
- data security
- business rules
- state transition
- security analysis
- role based access control
- information technology
- data protection
- attribute values
- security requirements
- secure information sharing
- requirements analysis
- user authentication
- security protocols
- public key
- security issues
- wireless networks
- knowledge management
- website