Model checking security policy model using both UML static and dynamic diagrams
Proceedings of the 4th international conference on Security of information and networks
SUDA: a scenario-based UML design analysis approach
Proceedings of the 2nd International Master Class on Model-Driven Engineering: Modeling Wizards
Hi-index | 0.00 |
There is a need for rigorous analysis techniquesthat developers can use to uncover security policyviolations in their UML designs. There are a few UMLanalysis tools that can be used for this purpose, butthey either rely on theorem-proving mechanisms thatrequire sophisticated mathematical skill to useeffectively, or they are based on model-checkingtechniques that require a “closed-world” view of thesystem (i.e., a system in which there are no inputs fromexternal sources). In this paper we show how alightweight, scenario-based UML design analysisapproach we developed can be used to rigorouslyanalyze a UML design to uncover security policyviolations.In the method, a UML design class model, in whichsecurity policies and operation specifications areexpressed in the Object Constraint Language (OCL), isanalyzed against a set of scenarios describingbehaviors that adhere to and that violate securitypolicies. The method includes a technique forgenerating scenarios. We illustrate how the methodcan be applied through an example involvingrole-based access control policies.