The Open UniversitySkip to content

An aspect-oriented approach to relating security requirements and access control

Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta and Nuseibeh, Bashar (2012). An aspect-oriented approach to relating security requirements and access control. In: CAiSE'12 Forum, 28 Jun 2012, Gdansk, Poland.

Full text available as:
PDF (Accepted Manuscript) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (348kB) | Preview
Google Scholar: Look up in Google Scholar


Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requirements as aspects that can be woven into functional requirements. Using problem frames to model the functional requirements, weaving is achieved by composing the modules representing security aspects with the requirement models. Moreover, we provide guidance on how such security aspects are structured to implement a particular access control solution. As a result, such security aspects become reusable solution patterns to refine the structure of security-related problem.

Item Type: Conference or Workshop Item
Copyright Holders: 2012 The Authors
Extra Information: 24th International Conference on Advanced Information Systems Engineering (CAiSE)
Keywords: security requirement; aspect-oriented requirements engineering; security pattern; access control; problem frames
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Research Group: Centre for Research in Computing (CRC)
Related URLs:
Item ID: 35534
Depositing User: Thein Tun
Date Deposited: 26 Nov 2012 16:44
Last Modified: 07 Dec 2018 23:06
Share this page:

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU