Model Driven Security: From UML models to access control infrastructures

被引:244
作者
Basin, D [1 ]
Doser, J
Lodderstedt, T
机构
[1] ETH, CH-8006 Zurich, Switzerland
[2] Interact Objects Software GmbH, D-79100 Freiburg, Germany
关键词
design; languages; security; Role-Based Access Control; Model Driven Architecture; Unified Modeling Language; Object Constraint Language; metamodeling; security engineering;
D O I
10.1145/1125808.1125810
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a new approach to building secure systems. In our approach, which we call Model Driven Security, designers specify system models along with their security requirements and use tools to automatically generate system architectures from the models, including complete, configured access control infrastructures. Rather than fixing one particular modeling language for this process, we propose a general schema for constructing such languages that combines languages for modeling systems with languages for modeling security. We present several instances of this schema that combine ( both syntactically and semantically) different UML modeling languages with a security modeling language for formalizing access control requirements. From models in the combined languages, we automatically generate access control infrastructures for server-based applications, built from declarative and programmatic access control mechanisms. The modeling languages and generation process are semantically well-founded and are based on an extension of Role-Based Access Control. We have implemented this approach in a UML-based CASE-tool and report on experiments.
引用
收藏
页码:39 / 91
页数:53
相关论文
共 28 条
  • [1] Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
  • [2] The RSL99 language for role-based separation of duty constraints
    Ahn, GJ
    Sandhu, R
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 43 - 54
  • [3] Ahn GJ, 2001, PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, P157, DOI 10.1109/ENABL.2001.953406
  • [4] AKEHURST DH, 2002, LNCS, V2460, P243, DOI DOI 10.1007/3-540-45800-X_
  • [5] [Anonymous], 2001, Convergent Architecture: Building Model Driven J2EE Systems with UML
  • [6] [Anonymous], MTR2997 MITR CORP
  • [7] [Anonymous], 1994, LNCS
  • [8] BECKERT B, 2002, DIKU TECHNICAL REPOR, V207, P113
  • [9] BEYER D, 2001, C COM PROGRAMMING BO
  • [10] Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295