Last update: Sun Aug 5 02:03:07 MDT 2018
@Article{Han:2000:CSO, author = "Yan Han and Xu Chun-Gen and Zhang Gong-Xuan and Liu Feng-Yu", title = "Constraint specification for object model of access control based on role", journal = j-SIGSOFT, volume = "25", number = "2", pages = "60--63", month = mar, year = "2000", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/346057.346074", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft2000.bib", abstract = "Constraint specifications for access control organize a set of constraints to control human-computer interaction for users to perform their duties securely and efficiently. Constraint specifications are imperative for the access control and security management of large and complex multi-user interactive applications. Existing specifications of Role-based Access Control are incomplete and complicated. This paper proposes a framework of well-defined constraint specifications for developers to build application-level access control based on users' roles. They ensure that each role is configured with consistent privileges, each actor is authorized to proper roles and then each actor can activate and play his authorized roles without interest conflicts. These formal specifications are consistent and inferable, complete and simplified, abundant and scalable for diversified multi-user applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", }