ls3-www.cs.tu-dortmund.de/cms/medien/publikationen/sacmat2001.pdf
Modular Authorization
are presented, and examples are discussed extensively.
Categories and Subject Descriptors D.4.6 [Software]: Operating Systems—Security and Pro- tection; K.6.5 [Computer Milieux]: Management of Com- puting [...] n teams, conflicts between rules inherited from higher ranking groups may occur, e.g. the role “software developer” may be more restricted in one of the groups than in the other one. Such conflicts have [...] is given.
2. SCENARIO In this section we briefly describe an application scenario suited to any software company, which is kept quite small, due to the page limitations. As shown in figure 1 the com- pany …