|DOI (Digital Object Identifier) Link:||http://doi.org/10.1007/978-3-540-78743-3_21|
|Google Scholar:||Look up in Google Scholar|
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which supports embedding security permissions in UML models and model-based security analysis by providing consistency checks. It also offers an automated analysis of underlying mechanisms for managing security-critical permissions using Prolog resp. automated theorem provers for first-order logic.
|Item Type:||Conference Item|
|Project Funding Details:||
|Extra Information:||Presented at one of the mainconferences at ETAPS, Fundamental Approaches to Software Engineering.
Published in Fundamental Approaches to Software Engineering
11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings / edited by José Luiz Fiadeiro and Paola Inverardi, Lecture Notes in Computer Science, 2008, Volume 4961, pp 292-295, © 2008 Springer-Verlag
|Academic Unit/Department:||Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
|Interdisciplinary Research Centre:||Centre for Research in Computing (CRC)
Centre for Policing Research and Learning (CPRL)
|Depositing User:||Yijun Yu|
|Date Deposited:||13 Jan 2011 12:44|
|Last Modified:||04 Oct 2016 10:48|
|Share this page:|