Role-Based Access Control Models
Computer
Software reuse: architecture, process and organization for business success
Software reuse: architecture, process and organization for business success
Designing Concurrent, Distributed, and Real-Time Applications with Uml
Designing Concurrent, Distributed, and Real-Time Applications with Uml
UML-Based Representation of Role-Based Access Control
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Role-Based Authorization Constraints Specification Using Object Constraint Language
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Using UML to reflect non-functional requirements
CASCON '01 Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research
Evolution in multiple-view models of software product families
Evolution in multiple-view models of software product families
Designing Software Product Lines with UML: From Use Cases to Pattern-Based Software Architectures
Designing Software Product Lines with UML: From Use Cases to Pattern-Based Software Architectures
Modeling Complex Systems by Separating Application and Security Concerns
ICECCS '04 Proceedings of the Ninth IEEE International Conference on Engineering Complex Computer Systems Navigating Complexity in the e-Engineering Age
Unified Modeling Language Reference Manual, The (2nd Edition)
Unified Modeling Language Reference Manual, The (2nd Edition)
Modeling and Composing Scenario-Based Requirements with Aspects
RE '04 Proceedings of the Requirements Engineering Conference, 12th IEEE International
Aspect-Oriented Software Development with Use Cases (Addison-Wesley Object Technology Series)
Aspect-Oriented Software Development with Use Cases (Addison-Wesley Object Technology Series)
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Visualizing early aspects with use case maps
Transactions on aspect-oriented software development III
Hi-index | 0.00 |
This paper describes an approach to model complex applications by modeling application requirements separately from security requirements in use case models. By careful separation of concerns, the security requirements are captured in security use cases separately from the application requirements, which are captured in application use cases. The approach reduces system complexity caused by mixing security requirements with business application requirements with the goal of making complex systems more maintainable. Furthermore, the security use cases can be reused by other software applications. This paper describes how the application and security concerns are modeled separately, and how they can be woven together into an application.