A Model-Driven Approach for the Specification and Analysis of Access Control Policies

被引:0
作者
Massacci, Fabio [1 ]
Zannone, Nicola [2 ]
机构
[1] Univ Trento, Dept Informat & Commun Technol, Trento, Italy
[2] Univ Toronto, Dept Comp Sci, Toronto, ON, Canada
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS | 2008年 / 5332卷
基金
加拿大自然科学与工程研究理事会;
关键词
Security Requirements Engineering; Access Control; Policy Specification;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The last years have seen the definition of many languages, models and standards tailored to specify and enforce access Control policies, but such frameworks do not provide methodological support during the policy specification process. In particular, they do not provide facilities for the analysis of the social context where the system operates. In this paper we propose a model-driven approach for the specification and analysis of access control policies. We build this framework Oil top of SI*. a modeling language tailored to capture and analyze functional and Security requirements of socio-technical systems. The framework also provides formal mechanisms to assist policy writers and system administrators in the verification of access control policies and of the actual user-permission assignment.
引用
收藏
页码:1087 / +
页数:3
相关论文
共 41 条
  • [1] The RSL99 language for role-based separation of duty constraints
    Ahn, GJ
    Sandhu, R
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 43 - 54
  • [2] [Anonymous], 2006, IEEE COMPUTER
  • [3] [Anonymous], EXTENSIBLE ACC CONTR
  • [4] The use of goals to surface requirements for evolving systems
    Anton, AI
    Potts, C
    [J]. PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, : 157 - 166
  • [5] *ASS CERT FRAUD EX, 2006, 2006 REP NAT
  • [6] Model Driven Security: From UML models to access control infrastructures
    Basin, D
    Doser, J
    Lodderstedt, T
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) : 39 - 91
  • [7] Cassandra: Flexible trust management, applied to electronic health records
    Becker, MY
    Sewell, P
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 139 - 154
  • [8] Bell D. E., 1976, MTR2997 MITRE CORP
  • [9] Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
  • [10] BREU R, 2007, STTT, V9, P457