Copy the page URI to the clipboard
Jurjens, Jan; Schreck, Jörg and Yu, Yijun
(2008).
DOI: https://doi.org/10.1007/978-3-540-78743-3_21
URL: http://etaps08.mit.bme.hu/
Abstract
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which supports embedding security permissions in UML models and model-based security analysis by providing consistency checks. It also offers an automated analysis of underlying mechanisms for managing security-critical permissions using Prolog resp. automated theorem provers for first-order logic.
Viewing alternatives
Metrics
Public Attention
Altmetrics from AltmetricNumber of Citations
Citations from DimensionsItem Actions
Export
About
- Item ORO ID
- 24304
- Item Type
- Conference or Workshop Item
- Project Funding Details
-
Funded Project Name Project ID Funding Body Not Set Not Set Royal Society - Extra Information
-
Presented at one of the mainconferences at ETAPS, Fundamental Approaches to Software Engineering.
Published in Fundamental Approaches to Software Engineering
11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings / edited by José Luiz Fiadeiro and Paola Inverardi, Lecture Notes in Computer Science, 2008, Volume 4961, pp 292-295, © 2008 Springer-Verlag - Academic Unit or School
-
Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM) - Research Group
- Centre for Research in Computing (CRC)
- Copyright Holders
- © Springer-Verlag
- Related URLs
- Depositing User
- Yijun Yu