Login / Signup
Consistent and Complete Access Control Policies in Use Cases.
Khaled Alghathbar
Duminda Wijesekera
Published in:
UML (2003)
Keyphrases
</>
access control policies
access control
conflict resolution
security policies
access control systems
distributed environment
databases
artificial intelligence
data mining
web services
low cost
fine grained
security requirements
trust negotiation
extended logic programs