The Open UniversitySkip to content

Challenges in Model-Based Evolution and Merging of Access Control Policies

Montrieux, Lionel; Wermelinger, Michel and Yu, Yijun (2011). Challenges in Model-Based Evolution and Merging of Access Control Policies. In: Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 5-6 Sep 2011, Szeged, Hungary.

Full text available as:
PDF (Version of Record) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (92kB)
Google Scholar: Look up in Google Scholar


Access Control plays a crucial part in software security, as it is responsible for making sure that users have access to the resources they need while being forbidden from accessing resources they do not need. Access control models such as Role-Based Access Control have been developed to help system administrators deal with the increasing complexity of the rules that determine whether or not a particular user should access a particular resource. These rules, as well as the users and their needs, are likely to evolve over time. In some cases, it may even be necessary to merge several access control configurations into a single one. In this position paper, we review existing research in model-based software evolution and merging, and argue the need for a specific approach for access control in order to take its specific requirements into account.

Item Type: Conference or Workshop Item
Copyright Holders: 2011 ACM
Extra Information: ISBN: 978-1-4503-0848-9
Pages: 116-120
Keywords: security; UML; RBAC; model; verification; evolution; incremental verification; merging; OCL; access control
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Research Group: Centre for Research in Computing (CRC)
Related URLs:
Item ID: 29084
Depositing User: Michel Wermelinger
Date Deposited: 12 Jul 2011 08:30
Last Modified: 08 May 2019 18:03
Share this page:

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU