![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Safety and Liveness for an RBAC/MAC Security Model
Our role-based/mandatory access control (RBAC/MAC) security model and enforcement framework for inter-operating legacy, COTS, GOTS, databases, servers, etc., limits: who (user/user role) can invoke which metho...
-
Chapter and Conference Paper
RBAC/MAC Security for UML
In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML...
-
Chapter
Role Delegation for a Resource-Based Security Model
Corporations and government agencies rely on inter-operating legacy, COTs, databases, clients, servers, etc., with security addressed from different dimensions. One dimension is delegation, where an authorized...
-
Chapter
User Role-Based Security Model for a Distributed Environment
A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resou...
-
Chapter
Software Agents for Role Based Security
In the age of information technology, organizations of all types are seeking to effectively utilize and disseminate information via dependable and secure distributed computing environments. While many existing...