Miro: Visual Specification of Security
IEEE Transactions on Software Engineering
A Parsing Methodology for the Implementation of Visual Systems
IEEE Transactions on Software Engineering
Toward a unified view of electronic commerce
Communications of the ACM
Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots: returning to our diverse roots
SecureFlow: a secure Web-enabled workflow management system
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Software engineering (6th ed.)
Software engineering (6th ed.)
Extending Visual Languages for Multimedia
IEEE MultiMedia
Task-Based Specifications Through Conceptual Graphs
IEEE Expert: Intelligent Systems and Their Applications
Interval-Based Conceptual Models for Time-Dependent Multimedia Data
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
A Framework for the Management of Information Security
ISW '97 Proceedings of the First International Workshop on Information Security
Electronic commerce: structures and issues
International Journal of Electronic Commerce - Special section: Diversity in electronic commerce research
Distributed electronic trade scenarios: representation, design, prototyping
International Journal of Electronic Commerce - Special issue: Formal aspects of digital commerce
A framework for modeling and implementing visual notations with applications to software engineering
ACM Transactions on Software Engineering and Methodology (TOSEM)
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
A system for visual role-based policy modelling
Journal of Visual Languages and Computing
Modeling of task-based authorization constraints in BPMN
BPM'07 Proceedings of the 5th international conference on Business process management
Hi-index | 0.00 |
The authors present a system for the visual specification of security policies. The system relies on the task-based authorization framework, which has been enhanced by visual languages to provide an intuitive way for specifying complex security concepts. Thus, the authors constructed the system by using visual language generation tools, which provides a flexible tool that can be easily customized for different application domains.