Automated analysis of security-design models

被引:76
作者
Basin, David [1 ]
Clavel, Manuel [2 ,3 ]
Doser, Juergen [1 ]
Egea, Marina [3 ]
机构
[1] ETH, Informat Secur Grp, Zurich, Switzerland
[2] IMDEA Software Inst, Madrid, Spain
[3] Univ Complutense Madrid, Dept Comp Sci, Madrid, Spain
关键词
UML; OCL; SecureUML; Security policies; Formal analysis; Metamodels;
D O I
10.1016/j.infsof.2008.05.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have previously proposed SecureUML, an expressive UML-based language for constructing security-design models, which are models that combine design specifications for distributed systems with specifications of their security policies. Here, we show how to automate the analysis of such models in a semantically precise and meaningful way. In our approach, models are formalized together with scenarios that represent possible run-time instances. Queries about properties of the security policy modeled are expressed as formulas in UML's Object Constraint Language. The policy may include both declarative aspects, i.e., static access-control information such as the assignment of users and permissions to roles, and programmatic aspects, which depend on dynamic information, namely the satisfaction of authorization constraints in a given scenario. We show how Such properties can be evaluated, completely automatically, in the context of the metamodel of the security-design language. We demonstrate, through examples, that this approach can be used to formalize and check non-trivial security properties. The approach has been implemented in the SecureMOVA tool and all of the examples presented have been checked using this tool. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:815 / 831
页数:17
相关论文
共 16 条
  • [1] AHN GJ, 2001, WETICE 01
  • [2] [Anonymous], LECT NOTES COMPUTER
  • [3] [Anonymous], 2003, MDA Explained, the Model Driven Architecture: Practice and Promise
  • [4] Model Driven Security: From UML models to access control infrastructures
    Basin, D
    Doser, J
    Lodderstedt, T
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) : 39 - 91
  • [5] BASIN D, 2007, LECT NOTES COMPUTER, V4735
  • [6] BASIN D, 2003, P 8 ACM S ACC CONTR
  • [7] BOULTON RJ, 1992, P IFIP TC10 WG 10 2
  • [8] Brito e Abreu F., 2001, ES0072001 FCTUNL INE
  • [9] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [10] GEORG G, 2002, ICECCS 02