The paper shows a SHEL oriented requirements engineering approach, which has been applied in a case study dealing with the definition of the requirements for a new railways traffi...
Massimo Felici, Mark-Alexander Sujan, Maria Wimmer
In recent years, advances in software tools have made it easier to analyze interactive system specifications, and the range of their possible behaviors. However, the effort involve...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...