The Open UniversitySkip to content

Enforcing a security pattern in stakeholder goal models

Yu, Yijun; Kaiya, Haruhiko; Washizaki, Hironori; Xiong, Yingfei; Hu, Zhenjiang and Yoshioka, Nobukazu (2008). Enforcing a security pattern in stakeholder goal models. In: 4th ACM Workshop on Quality of Protection in conjunction with CCS '08, 15th ACM Conference on Computer and Communications Security, 27-31 October 2008, Alexandria, VA, USA.

Full text available as:
Full text not publicly available
Due to copyright restrictions, this file is not available for public download
DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several goal-oriented stakeholder requirements.

Item Type: Conference Item
Copyright Holders: 2008 ACM
Project Funding Details:
Funded Project NameProject IDFunding Body
Not SetNot SetNII-GRACE Center, Japan
Not SetNot SetRoyal Society, UK
Extra Information: Published in the Proceedings of the 4th ACM Workshop on Quality of Protection in CCS '08 15th ACM Conference on Computer and Communications Security 2008, Alexandria, VA, USA, October 27-31, 2008 (ISBN 978-1-60558-321-1)
Keywords: security patterns; RBAC; goal models; model transformations
Academic Unit/Department: Mathematics, Computing and Technology > Computing & Communications
Mathematics, Computing and Technology
Interdisciplinary Research Centre: Centre for Research in Computing (CRC)
Related URLs:
  • (Other)
Item ID: 33463
Depositing User: Mary Mcmahon
Date Deposited: 15 May 2012 14:47
Last Modified: 25 Feb 2016 15:34
Share this page:


Scopus Citations

▼ Automated document suggestions from open access sources

Actions (login may be required)

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340