메뉴 건너뛰기




Volumn 49, Issue 2, 2007, Pages 142-157

Validating the enforcement of access control policies and separation of duty principle in requirement engineering

Author keywords

Access control policies; Security engineering; Semi formal methods; Separation of duty; Use cases

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; CONTROL SYSTEMS; SECURITY OF DATA;

EID: 33751113935     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2006.03.009     Document Type: Article
Times cited : (21)

References (30)
  • 1
    • 33751110867 scopus 로고    scopus 로고
    • K. Alghathbar, D. Wijesekera, Modeling dynamic role-based access constraints using UML, in: Proceedings of the 1st International Conference on Software Engineering Research & Applications (ICSERA'03), San Francisco, CA, June (2003).
  • 3
    • 0002198395 scopus 로고
    • Towards a theory of declarative knowledge
    • Minker J. (Ed), Morgan Kaufman, San Mateo
    • Apt K., Blair H., and Walker A. Towards a theory of declarative knowledge. In: Minker J. (Ed). Foundations of deductive databases (1988), Morgan Kaufman, San Mateo 89-148
    • (1988) Foundations of deductive databases , pp. 89-148
    • Apt, K.1    Blair, H.2    Walker, A.3
  • 6
    • 33751071571 scopus 로고    scopus 로고
    • G. Brose, M. Koch, K.-P. Löhr, Integrating access control design into the software development process, in: Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology (IDPT), Pasadena, CA, June (2002).
  • 7
    • 84944060696 scopus 로고    scopus 로고
    • A typed access control model for CORBA
    • Proceedings European Symposium on Research in Computer Security (ESORICS). Cuppens F., Deswarte Y., Gollmann D., and Weidner M. (Eds), Springer, Berlin
    • Brose G. A typed access control model for CORBA. In: Cuppens F., Deswarte Y., Gollmann D., and Weidner M. (Eds). Proceedings European Symposium on Research in Computer Security (ESORICS). Lecture Notes in Computer Science vol. 1895 (2000), Springer, Berlin 88-105
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 88-105
    • Brose, G.1
  • 8
    • 0023266943 scopus 로고    scopus 로고
    • D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, in: Proceedings of the IEEE Symposium on Security and Privacy, 1987, pp. 184-919.
  • 9
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: a roadmap
    • Finkelstein A. (Ed), ACM Press, New York
    • Devanbu P.T., and Stubblebine S. Software engineering for security: a roadmap. In: Finkelstein A. (Ed). The Future of Software Engineering (2000), ACM Press, New York
    • (2000) The Future of Software Engineering
    • Devanbu, P.T.1    Stubblebine, S.2
  • 10
    • 0024663629 scopus 로고    scopus 로고
    • J. Dobson, J. McDermid, A framework for expressing models of security policy, in: Proceedings of the IEEE Symposium on Security and Privacy, 1989, pp. 229-241.
  • 11
    • 33751088508 scopus 로고    scopus 로고
    • E. Fernandez-Medina, A. Martinez, C. Medina, M. Piattini, Integrating multilevel security in the database design process, in: Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology (IDPT), Pasadena, CA, June (2002).
  • 13
    • 85030843209 scopus 로고
    • Making inconsistency respectable: a logical framework for inconsistency in reasoning, phase1 - a position paper
    • Springer, Berlin
    • Gabbay D., and Hunter A. Making inconsistency respectable: a logical framework for inconsistency in reasoning, phase1 - a position paper. Proceedings of Fundamentals of Artificial Intelligence Research (1991), Springer, Berlin 19-32
    • (1991) Proceedings of Fundamentals of Artificial Intelligence Research , pp. 19-32
    • Gabbay, D.1    Hunter, A.2
  • 14
    • 0004226214 scopus 로고
    • Making Inconsistency Respectable: A Logical Framework for Inconsistency in Reasoning, Phase2
    • Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, Berlin
    • Gabbay D., and Hunter A. Making Inconsistency Respectable: A Logical Framework for Inconsistency in Reasoning, Phase2. Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Lecture Notes in Computer Science (1992), Springer, Berlin 129-136
    • (1992) Lecture Notes in Computer Science , pp. 129-136
    • Gabbay, D.1    Hunter, A.2
  • 16
    • 33751095607 scopus 로고    scopus 로고
    • M. Gelfond, V. Lifschitz, The stable model semantics for logic programming. in: Proceedings of the 5th International Conference and Symposium on Logic Programming, Seattle, Washington, 1988, pp. 1070-1080.
  • 17
    • 0031682433 scopus 로고    scopus 로고
    • V. Gligor, S. Gavrila, D. Ferraiolo, On the formal definition of separation of duty policies and their composition, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May (1998).
  • 19
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Fundamental Approaches to Software Engineering, 4th Internacional Conference, Proceedings. Hussmann H. (Ed), Springer, Berlin
    • Jurjens J. Towards development of secure systems using UMLsec. In: Hussmann H. (Ed). Fundamental Approaches to Software Engineering, 4th Internacional Conference, Proceedings. Lecture Notes in Computer Science (2001), Springer, Berlin 187-200
    • (2001) Lecture Notes in Computer Science , pp. 187-200
    • Jurjens, J.1
  • 21
    • 0025099231 scopus 로고    scopus 로고
    • M. Nash, K. Poland, Some conundrums concerning separation of duty, In: Proceedings of the IEEE Symposium on Security and Privacy, May 1990, pp. 201-207.
  • 23
    • 33751116529 scopus 로고    scopus 로고
    • Object Management Group, OMG Unified Modeling Language Specification, Version 1.4, 2001 .
  • 25
    • 0024125647 scopus 로고    scopus 로고
    • R.S. Sandhu, Transaction control expressions for separation of duties, in: Proceedings of the Fourth Computer Security Applications Conference, 1988, pp. 282-286.
  • 26
    • 78650610301 scopus 로고    scopus 로고
    • From use cases to system operation specifications
    • Sendall S., and Strohmeier A. From use cases to system operation specifications. UML (2000) 1-15
    • (2000) UML , pp. 1-15
    • Sendall, S.1    Strohmeier, A.2
  • 27
    • 33751080087 scopus 로고    scopus 로고
    • S. Sendall, Specifying Reactive System Behavior, Ph.D. thesis, Swiss Federal Institute of Technology - Lausanne (EPFL), May (2002).
  • 28
    • 79957904799 scopus 로고    scopus 로고
    • R. Simon, M. Zurko, Separation of duty in role-based environments, in: Proceedings of the 10th Computer Security Foundations Workshop, Rockport, Massachusetts, June (1997).
  • 30
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: a new approach
    • Woo T., and Lam S. Authorizations in distributed systems: a new approach. Journal of Computer Security 2 2-3 (1993) 107-136
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.