Software Architectural Alternatives for User Role-Based Security Policies.
Steven A. DemurjianT. C. TingJohn A. ReisnerPublished in: DBSec (1997)
Keyphrases
- security policies
- access control
- access control systems
- software architecture
- access rights
- user interface
- access control policies
- ubiquitous computing environments
- security management
- distributed systems
- software systems
- security requirements
- network security
- end users
- software application
- unauthorized access
- software design
- computer systems
- data security
- software development
- cyber attacks
- decision makers
- security concerns
- home network
- source code
- commercial off the shelf
- software engineering