Verification of Access Control Coherence in Information System during Modifications

  • Authors:
  • Gilles Goncalves;Fred Hemery;Aneta Poniszewska

  • Affiliations:
  • -;-;-

  • Venue:
  • WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper deals with management of accesscontrol in an information system. It is suggested that the security of an information system should be a task solved on two principal levels: system development level and security administration level. Consequently, the responsibility for creating e每ective security measuresfor an information system ought to lie with boththe application developer and the global administration. Moreover, sets of security constraintsshould be formulated also on those two levels.The paper de陆nes requirements and obligations of each level using adapted tools based onthe role-based access control (RBAC) model andemploying the object-oriented conception methodwith UML (Unified Modeling Language).It is shown how the process of addition of anew application to an information system maybe automated and how the administrator can beassisted in detecting incoherences or/and determining new relations between the elements existing in a system, such as roles or permissions.