You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Definition

The Security Constraints (Sc-Ct) domain shows the security-related policy, guidance, laws and regulations as applicable to resources. It Specifies textual rules/non-functional requirements that are security constraints on resources, information and data (e.g. security-related in the form of rules (e.g. access control policy). A common way of representing access control policy is through the use of XACML (eXtensible Access Control Markup Language), it is expected that implementations of UAF allow users to link security constraints to external files represented in XACML.

Implementation

The Security Constraints (Sc-Ct) domain is represented by:

Sample

An example of the Security Constraints diagram