Generating security description of applications for security frameworks

Table of Contents

1. Motivation
2. RBAC model overview
3. DTE model overview
4. XML representation properties
5. XML representation components
6. Proposed transformations
7. NSA SELinux transformation
8. Medusa DS9 transformation
9. Conclusion & discussion