Author:
Heldal Rogardt,Hultin Fredrik
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Bell, D., LaPadula, L.: Secure Computer Systems:Mathematical Foundations and Model. Technical Report MTR 2547 v2, The MITRE Corporation (November 1973)
2. Lecture Notes in Computer Science;B. Blobel,1999
3. Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)
4. Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM 20(7), 504–513 (1977)
5. Epstein, P., Sandhu, R.: Towards A UML Based Approach to Role Engineering. In: RBAC 1999, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, October 28-29, pp. 135–143 (1999)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献