Jurjens, Jan; Schreck, Jörg and Yu, Yijun
|DOI (Digital Object Identifier) Link:||http://dx.doi.org/doi:10.1007/978-3-540-78743-3_21|
|Google Scholar:||Look up in Google Scholar|
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which supports embedding security permissions in UML models and model-based security analysis by providing consistency checks. It also offers an automated analysis of underlying mechanisms for managing security-critical permissions using Prolog resp. automated theorem provers for first-order logic.
|Item Type:||Conference Item|
|Extra Information:||Presented at one of the mainconferences at ETAPS, Fundamental Approaches to Software Engineering.
Published in Fundamental Approaches to Software Engineering
11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings / edited by José Luiz Fiadeiro and Paola Inverardi, Lecture Notes in Computer Science, 2008, Volume 4961, pp 292-295, © 2008 Springer-Verlag
|Academic Unit/Department:||Mathematics, Computing and Technology > Computing|
|Interdisciplinary Research Centre:||Centre for Research in Computing (CRC)|
|Depositing User:||Yijun Yu|
|Date Deposited:||13 Jan 2011 12:44|
|Last Modified:||13 Jan 2011 13:00|
Actions (login may be required)
|Report issue / request change|