Role-Based Access Control Models
Computer
An object-oriented database architecture for providing security in cyberspace
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
Theoretical Computer Science
Linguistically based conceptual modeling of business communication
Data & Knowledge Engineering - Special issue on NLDB '99: applications of natural language to information systems
WordNet++: a lexicon for the color-X-method
Data & Knowledge Engineering
The Integration of Security and Integrity Constraints in MOKUM
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Specifying Application-level Security in Workflow Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Security Moving from Database Systems to ERP Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Workflow analyzed for security and privacy in using databases
Journal of Computer Security - IFIP 2000
Advances in business process management
Data & Knowledge Engineering - Special issue: Advances in business process management
Data & Knowledge Engineering - Special jubilee issue: DKE 50
Model driven development of secure XML data warehouses: a case study
Proceedings of the 2010 EDBT/ICDT Workshops
View-based model-driven architecture for enhancing maintainability of data access services
Data & Knowledge Engineering
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Hi-index | 0.00 |
The use of the Mokum system for correctly designing Information Systems (in the old days called Data Base Systems) and how these designs can automatically be translated into implementations, is one theme of this paper. Theoretical considerations will not be avoided. Similarities and differences with tools from the field of Model Driven Architecture, such as UML, will be demonstrated. How to deal with Mokum in a situation with many sites, as in real Cyberspace is demonstrated as a second theme. Special attention is given to a protocol: MAP, which guarantees that a certain access constraint is being maintained. The constraint being that for an object in one site to obtain access to an attribute of an object in another, a third site must give permission. The technique is based on a new notion: the Triple, to be used in a Knowledge based Engineering environment.