Research Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
Figure 7
Specification of the meeting scheduler with SecureUML.
(a) Users-roles and roles-roles assignments |
(b) Permissions-roles assignments |