Systematic development of security sensitive software requires that there be a sufficiently expressive linguistic extension to modeling languages. We propose an extension to the Unified Modeling Language (UML) to satisfy this need. Our extensions are to the UML metamodel with a security policy constraint specification and enforcement module, business tasks and a history log for method calls. Using these extensions we show how dynamic access control requirements of an application can be modeled during the design phas
International audienceSecurity requirements are part of business requirements, either because they d...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Abstract We have previously proposed an expressive UML-based lan-guage for constructing and transfor...
To improve software security, security requirements must be considered along with functional require...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Security for software applications involves defining what needs to be protected (security policy), a...
Security requirements have become an integral part of most modern software systems. In order to prod...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
Part 1: ConferenceInternational audienceThis paper presents an extension of role-based access contro...
Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorize...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
Prohibiting unauthorized access to critical resources and data has become a major requirement for en...
We present a modeling language for the model-driven development of secure, distributed systems base...
International audienceSecurity requirements are part of business requirements, either because they d...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Abstract We have previously proposed an expressive UML-based lan-guage for constructing and transfor...
To improve software security, security requirements must be considered along with functional require...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Security for software applications involves defining what needs to be protected (security policy), a...
Security requirements have become an integral part of most modern software systems. In order to prod...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
Part 1: ConferenceInternational audienceThis paper presents an extension of role-based access contro...
Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorize...
The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLs...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
Prohibiting unauthorized access to critical resources and data has become a major requirement for en...
We present a modeling language for the model-driven development of secure, distributed systems base...
International audienceSecurity requirements are part of business requirements, either because they d...
Abstract In software construction, analysis investigates system requirements and design captures sys...
Abstract We have previously proposed an expressive UML-based lan-guage for constructing and transfor...