Helping to Meet the Security Needs of Enterprises: Using FDAF to Build RBAC into Software Architectures.
Lirong DaiKendra M. L. CooperPublished in: Software Engineering Research and Practice (2006)
Keyphrases
- software architecture
- security requirements
- access control
- role based access control
- security mechanisms
- functional requirements
- rbac model
- security policies
- description language
- software systems
- security model
- software engineering
- data security
- information security
- network security
- reference model
- access control policies
- embedded software
- multi domain
- access control models
- security issues
- reference architecture
- access control mechanism
- statistical databases
- software development
- distributed systems
- virtual enterprise
- sensitive data
- database
- sensitive information
- design patterns
- smart card
- product line
- open source
- e learning
- databases