To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which supports embedding security permissions in UML models and model-based security analysis by providing consistency checks. It also offers an automated analysis of underlying mechanisms for managing security-critical permissions using Prolog resp. automated theorem provers for first-order logic
Abstract In software construction, analysis investigates system requirements and design captures sys...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Developing security-critical systems is difficult, and there are many well-known examples of vulnera...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
Developing security-critical systems is difficult and there are many well-known examples of security...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
We present tool-support for checking UML models and C code against security requirements. A framewor...
Security for software applications involves defining what needs to be protected (security policy), a...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
In software construction, analysis investigates the boundary of a system (scope and requirements), i...
To improve software security, security requirements must be considered along with functional require...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
Abstract In software construction, analysis investigates system requirements and design captures sys...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Developing security-critical systems is difficult, and there are many well-known examples of vulnera...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
Developing security-critical systems is difficult and there are many well-known examples of security...
We have previously proposed SecureUML, an expressive UML-based language for constructing security-de...
We present tool-support for checking UML models and C code against security requirements. A framewor...
Security for software applications involves defining what needs to be protected (security policy), a...
Systematic development of security sensitive software requires that there be a sufficiently expressi...
Role-based access control (RBAC) is a flexible approach to access control, which has generated great...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
In software construction, analysis investigates the boundary of a system (scope and requirements), i...
To improve software security, security requirements must be considered along with functional require...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
Abstract In software construction, analysis investigates system requirements and design captures sys...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Developing security-critical systems is difficult, and there are many well-known examples of vulnera...