Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Figure 7

Specification of the meeting scheduler with SecureUML.
(a) Users-roles and roles-roles assignments
(b) Permissions-roles assignments