Abstract | ||
---|---|---|
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systemsý resources. These permissions rely on certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We address this problem using an approach which embeds security permissions in UML models and supports model-based security analysis by providing consistency checks. The presented formal framework also prepares the ground for an automated analysis of underlying protocols for managing security-critical permissions, for example with the help of first-order logic theorem proving. We explain how the models can be securely implemented in a language such as Java. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/ICECCS.2005.61 | ICECCS |
Keywords | Field | DocType |
permission-based security,security-critical permission,model-based security analysis,model-based design,security permission,computer system,uml model,certain restriction,first-order logic theorem,formal framework,consistency check,automated analysis,formal specification,first order logic,logic,computer security,unified modeling language,authorisation,java,programming,logic programming,class diagram,access control,theorem prover,model based design,sequence diagram,theorem proving,formal semantics,security analysis,protocols,first order,object oriented design | Permission,Programming language,Software engineering,Systems engineering,Computer science,Automated theorem proving,Formal specification,Model-based design,Security service,Security analysis,Logic programming,Computer security model | Conference |
ISBN | Citations | PageRank |
0-7695-2284-X | 5 | 0.42 |
References | Authors | |
8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jan Jurjens | 1 | 169 | 16.07 |
Markus Lehrhuber | 2 | 5 | 0.42 |
Guido Wimmel | 3 | 204 | 15.17 |