Title
Representing Access Control Policies In Use Cases
Abstract
Security requirements of a software product need to receive attention throughout its development lifecycle. This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description. Such enhancements offer simple representation for positive and negative authorization, grouping sensitive use cases that form a critical business task, separation of duties both - static and dynamic, least privilege, inheritance of authorizations, and security state or label for data inputted, stored or outputted. Validating information flow requirements at an early stage prevents costly fixes that are mandated during later stages of the development life cycle.
Year
Venue
Keywords
2012
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY
Access control policies, security engineering, use cases, misuse
DocType
Volume
Issue
Journal
9
3
ISSN
Citations 
PageRank 
1683-3198
2
0.51
References 
Authors
11
1
Name
Order
Citations
PageRank
Khaled Alghathbar149832.54