Pressures are increasing on organisations to take an early and more systematic approach to security. A key to enforcing security is to restrict access to valuable assets. We regard access policies as security requirements that specify such restrictions. Current requirements engineering methods are generally inadequate for eliciting and analysing these types of requirements, because they do not allow complex organisational structures and procedures that underlie policies to be represented adequately. This paper discusses roles and why they are important in the analysis of security. The paper relates roles to organisational theory and how they could be employed to define access policies. A framework is presented, based on these concepts, ...
International audienceSecurity requirements are part of business requirements, either because they d...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
In the last years software engineers have recognized the need to integrate security into the softwar...
The restriction of access is a mechanism by which organisations protect their information assets. Re...
The restriction of access is a mechanism by which organisations protect their information assets. Re...
Enforcing access policies derived from management control principles is a way by which organisations...
We outline a framework for specifying management roles which defines both authorisation and obligati...
The paper focuses on role engineering which is an important topic in the development of access contr...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
This article describes how earlier detection of security problems and the implementation of solution...
This paper maintains that for an access-control mechanism to support a wide range of policies, it is...
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem u...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Needs about security are matters little taken into account when managing requirements engineering , ...
Nowadays, the growth and complexity of functionalities of current information systems, especially dy...
International audienceSecurity requirements are part of business requirements, either because they d...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
In the last years software engineers have recognized the need to integrate security into the softwar...
The restriction of access is a mechanism by which organisations protect their information assets. Re...
The restriction of access is a mechanism by which organisations protect their information assets. Re...
Enforcing access policies derived from management control principles is a way by which organisations...
We outline a framework for specifying management roles which defines both authorisation and obligati...
The paper focuses on role engineering which is an important topic in the development of access contr...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
This article describes how earlier detection of security problems and the implementation of solution...
This paper maintains that for an access-control mechanism to support a wide range of policies, it is...
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem u...
Although security requirements engineering has recently attracted increasing attention, it has lacke...
Needs about security are matters little taken into account when managing requirements engineering , ...
Nowadays, the growth and complexity of functionalities of current information systems, especially dy...
International audienceSecurity requirements are part of business requirements, either because they d...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
In the last years software engineers have recognized the need to integrate security into the softwar...