Requirements traceability to support evolution of access control

  • Authors:
  • Tine Verhanneman;Frank Piessens;Bart De Win;Wouter Joosen

  • Affiliations:
  • DistriNet, K.U.Leuven, Leuven, Belgium;DistriNet, K.U.Leuven, Leuven, Belgium;DistriNet, K.U.Leuven, Leuven, Belgium;DistriNet, K.U.Leuven, Leuven, Belgium

  • Venue:
  • SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the hurdles in the enforcement of access control remains the translation of the organization's high level policy, that drives the access control decisions, down to technology specific deployment descriptors, configuration files and code. This huge gap between the high level policy and the access logic has as a consequence that it is hard to trace implementation fragments to the actual requirement they contribute to, and to support evolution. The notion of an access interface is introduced as a contract between the authorization engine and the various applications using its services. A so-called view connector makes sure that the application behaves consistently with this contract. The implementation is based on aspect orientation, rendering the whole design more robust in the light of unanticipated changes.