A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

被引:7
作者
Yu, Lijun [1 ]
France, Robert [1 ]
Ray, Indrakshi [1 ]
Ghosh, Sudipto [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
来源
2009 14TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS) | 2009年
关键词
D O I
10.1109/ICECCS.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML. designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a lightweight, scenario-based UML design analysis approach we developed can be used to rigorously analyze a UML, design to uncover security policy violations. In the method, a UML design class model, in which security policies and operation specifications are expressed in the Object Constraint Language (OCL), is analyzed against a set of scenarios describing behaviors that adhere to and that violate security policies. The method includes a technique for generating scenarios. We illustrate how the method can be applied through an example involving role-based access control policies.
引用
收藏
页码:126 / 135
页数:10
相关论文
共 24 条
  • [1] Ahn GJ, 2001, PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, P157, DOI 10.1109/ENABL.2001.953406
  • [2] [Anonymous], OBJ CONSTR LANG SPEC
  • [3] Chiorean D., 2004, ELECTRON NOTES THEOR, V102, P99, DOI DOI 10.1016/J.ENTCS.2003.09.005
  • [4] Davies J., 1996, Using Z: Specification, Refinement and Proof
  • [5] Dinh-Trong T, 2005, IEEE INT C ENG COMP, P519
  • [6] Towards a UML based approach to role engineering
    Epstein, P
    Sandhu, R
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 135 - 143
  • [7] Animated simulation of integrated UML behavioral models based on graph transformation
    Ermel, C
    Hölscher, K
    Kuske, S
    Ziemann, P
    [J]. 2005 IEEE Symposium on Visual Language and Human-Centric Computing, Proceedings, 2005, : 125 - 133
  • [8] FERRAIOLO DF, 2001, ACM T INFORM SYSTEMS, V4
  • [9] USE:: A UML-based specification environment for validating UML and OCL
    Gogolla, Martin
    Buettner, Fabian
    Richters, Mark
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2007, 69 (1-3) : 27 - 34
  • [10] Alloy: A lightweight object modelling notation
    Jackson, D
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2002, 11 (02) : 256 - 290