Analyzing and Managing Role-Based Access Control Policies

K Sohr, M Drouineaud, G Ahn, M Gogolla. Analyzing and Managing Role-Based Access Control Policies. IEEE Transactions on Knowledge and Data Engineering, , Jan 2008.

Abstract

the dependencies of IT systems wrt . Otherwise, unauthorized and consequently fraud may instead of `` - authorization constraint