A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Hi-index | 0.00 |
CSCW systems provide computer support to facilitate cooperation between users. In this paper we propose an approach for the formal specification of functionality requirements and confidentiality security requirements of a CSCW application. These requirements give rise to safety and confidentiality properties that a CSCW system, supporting the application, should uphold. The specification technique is illustrated with a case study.