Sound methods and effective tools for model-based security engineering with UML
Proceedings of the 27th international conference on Software engineering
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Model-based security analysis for mobile communications
Proceedings of the 30th international conference on Software engineering
Secure Systems Development with UML
Secure Systems Development with UML
Model-Based Run-Time Checking of Security Permissions Using Guarded Objects
Runtime Verification
A systematic review of security requirements engineering
Computer Standards & Interfaces
Security requirements engineering framework for software product lines
Information and Software Technology
A transformation contract to generate aspects from access control policies
Software and Systems Modeling (SoSyM)
Hi-index | 0.00 |
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enforce certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We present research towards a tool which supports embedding security permissions in UML models and model-based security analysis by providing consistency checks. It also offers an automated analysis of underlying mechanisms for managing security-critical permissions using Prolog resp. automated theorem provers for first-order logic.