Security for software applications involves defining what needs to be protected (security policy), authorizing privileges of the application to users, authenticating application users, and providing a high degree of security assurance in regards to the access of users to the application. To address security during software design/development, our previous work has proposed a model to incorporate role-based access control (RBAC) and mandatory access control (MAC) into the unified modeling language (UML) to support the definition of security for software applications. Included in this work is a series of design-time checks that insure that the defined RBAC/MAC security is always consistent as a UML design with security properties is created a...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
Security requirements have become an integral part of most modern software systems. In order to prod...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Security must be a first class citizen in the design of large scale, interacting, software applicati...
In software construction, analysis investigates the boundary of a system (scope and requirements), i...
The design of large scale, interacting, software applications is a complex task, with the inclusion ...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
To improve software security, security requirements must be considered along with functional require...
Security is an integral part of most distributed modern software systems, but is still not consider...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
Security requirements have become an integral part of most modern software systems. In order to prod...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Security must be a first class citizen in the design of large scale, interacting, software applicati...
In software construction, analysis investigates the boundary of a system (scope and requirements), i...
The design of large scale, interacting, software applications is a complex task, with the inclusion ...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
To improve software security, security requirements must be considered along with functional require...
Security is an integral part of most distributed modern software systems, but is still not consider...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
Security requirements have become an integral part of most modern software systems. In order to prod...