Last update: Sun Aug 5 02:03:07 MDT 2018
@Article{Han:2000:CSO,
author = "Yan Han and Xu Chun-Gen and Zhang Gong-Xuan and Liu
Feng-Yu",
title = "Constraint specification for object model of access
control based on role",
journal = j-SIGSOFT,
volume = "25",
number = "2",
pages = "60--63",
month = mar,
year = "2000",
CODEN = "SFENDP",
DOI = "https://doi.org/10.1145/346057.346074",
ISSN = "0163-5948 (print), 1943-5843 (electronic)",
ISSN-L = "0163-5948",
bibdate = "Wed Aug 1 17:13:56 MDT 2018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2000.bib",
abstract = "Constraint specifications for access control organize
a set of constraints to control human-computer
interaction for users to perform their duties securely
and efficiently. Constraint specifications are
imperative for the access control and security
management of large and complex multi-user interactive
applications. Existing specifications of Role-based
Access Control are incomplete and complicated. This
paper proposes a framework of well-defined constraint
specifications for developers to build
application-level access control based on users' roles.
They ensure that each role is configured with
consistent privileges, each actor is authorized to
proper roles and then each actor can activate and play
his authorized roles without interest conflicts. These
formal specifications are consistent and inferable,
complete and simplified, abundant and scalable for
diversified multi-user applications.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGSOFT Software Engineering Notes",
journal-URL = "https://dl.acm.org/citation.cfm?id=J728",
}