2004
DOI: 10.1007/978-3-540-30187-5_27
|View full text |Cite
|
Sign up to set email alerts
|

Extending OCL for Secure Database Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…We have already commented on our earlier works [12,18] in the introduction of this paper, in particular, we now support the RDM2000 model for delegation and revocation. Other works which discuss role-based policy languages based on UML include [28,37,38,39,40,13]. Some of the approaches do not particularly address RBAC like UMLsec [37].…”
Section: Related Workmentioning
confidence: 99%
“…We have already commented on our earlier works [12,18] in the introduction of this paper, in particular, we now support the RDM2000 model for delegation and revocation. Other works which discuss role-based policy languages based on UML include [28,37,38,39,40,13]. Some of the approaches do not particularly address RBAC like UMLsec [37].…”
Section: Related Workmentioning
confidence: 99%
“…This secure data PIM is represented through an extended UML class diagram, so as to be able to represent security aspects together with a set of security constraints that have been expressed through OSCL language [8], as we will see in the next section.…”
Section: Secure Xml Db Development Processmentioning
confidence: 99%
“…To develop a secure data PIM, a secure UML profile has been developed (for more details, see [8]). The defined UML profile allows us to classify both data and users according to different classification criteria.…”
Section: Secure Data Pimmentioning
confidence: 99%
See 2 more Smart Citations