Role-based security in data base management systems
on Database Security: Status and Prospects
Automatic text processing: the transformation, analysis, and retrieval of information by computer
Automatic text processing: the transformation, analysis, and retrieval of information by computer
ACM Computing Surveys (CSUR)
The design and implementation of hierarchical software systems with reusable components
ACM Transactions on Software Engineering and Methodology (TOSEM)
Role-based security: pros, cons, & some research directions
ACM SIGSAC Review
Support for security modeling in information systems design
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Database security
Building reusable components through project evolution analysis
CAISE '93 Selected papers from the fifth international conference on Advanced information systems engineering
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Enhanced Security Models for Operating Systems: A Cryptographic Approach
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Hi-index | 0.02 |
The development of a security system is generally performed through a multiphase methodology, starting from the initial preliminary analisys of the application environment, up to the physical implementation of the security mechanisms. In this framework, we propose a new approach for the development of security systems based on the reuse of existing security specifications. In the paper we illustrate how reusable specifications can be built by analyzing existing security systems, and how they can be used to develop new security systems not from scratch.