메뉴 건너뛰기




Volumn 5332 LNCS, Issue , 2008, Pages 1087-1103

A model-driven approach for the specification and analysis of access control policies

Author keywords

Access control; Policy specification; Security requirements engineering

Indexed keywords

CRYPTOGRAPHY; MODELING LANGUAGES; SPECIFICATIONS;

EID: 58049083589     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (42)
  • 1
    • 85031151129 scopus 로고    scopus 로고
    • The RSL99 language for role-based separation of duty constraints
    • ACM Press, New York
    • Ahn, G.-J., Sandhu, R.: The RSL99 language for role-based separation of duty constraints. In: Proc. of RBAC 1999, pp. 43–54. ACM Press, New York (1999)
    • (1999) Proc. of RBAC 1999 , pp. 43-54
    • Ahn, G.-J.1    Sandhu, R.2
  • 2
    • 0031597160 scopus 로고    scopus 로고
    • The use of goals to surface requirements for evolving systems
    • IEEE Press, Los Alamitos
    • Antón, A.I., Potts, C.: The use of goals to surface requirements for evolving systems. In: Proc. of ICSE 1998, pp. 157–166. IEEE Press, Los Alamitos (1998)
    • (1998) Proc. of ICSE 1998 , pp. 157-166
    • Antón, A.I.1    Potts, C.2
  • 4
    • 33745471209 scopus 로고    scopus 로고
    • Model Driven Security: From UML Models to Access Control Infrastructures
    • Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructures. TOSEM 15(1), 39–91 (2006)
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 5
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management, applied to electronic health records
    • IEEE Press, Los Alamitos
    • Becker, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: Proc. of CSFW 2004, pp. 139–154. IEEE Press, Los Alamitos (2004)
    • (2004) Proc. of CSFW 2004 , pp. 139-154
    • Becker, M.Y.1    Sewell, P.2
  • 6
    • 0003400251 scopus 로고
    • Secure Computer System: Unified Exposition and MULTICS Interpretation
    • The MITRE Corporation, Bedford, MA
    • Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA (1976)
    • (1976) Technical Report MTR-2997 Rev , vol.1
    • Bell, D.E.1    Lapadula, L.J.2
  • 7
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. TISSEC 2(1), 65–104 (1999)
    • (1999) TISSEC , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 35348977674 scopus 로고    scopus 로고
    • Model based development of access policies
    • Breu, R., Popp, G., Alam, M.: Model based development of access policies. STTT 9, 457–470 (2007)
    • (2007) STTT , vol.9 , pp. 457-470
    • Breu, R.1    Popp, G.2    Alam, M.3
  • 9
    • 33646062882 scopus 로고    scopus 로고
    • External Sources of Computation for Answer Set Solvers
    • Baral, C., Greco, G., Leone, N., Terracina, G. (eds.), Springer, Heidelberg
    • Calimeri, F., Ianni, G.: External Sources of Computation for Answer Set Solvers. In: Baral, C., Greco, G., Leone, N., Terracina, G. (eds.) LPNMR 2005. LNCS (LNAI), vol. 3662, pp. 105–118. Springer, Heidelberg (2005)
    • (2005) LPNMR 2005. LNCS (LNAI) , vol.3662 , pp. 105-118
    • Calimeri, F.1    Ianni, G.2
  • 10
    • 47649094419 scopus 로고
    • Role engineering
    • Coyne, E.J.: Role engineering. In: Proc. of RBAC 1995, pp. 15–16. ACM Press, New York (1995)
    • (1995) Proc. of RBAC , pp. 15-16
    • Coyne, E.J.1
  • 11
    • 27644540336 scopus 로고    scopus 로고
    • On Modelling Access Policies: Relating Roles to their Organisational Context
    • Crook, R., Ince, D., Nuseibeh, B.: On Modelling Access Policies: Relating Roles to their Organisational Context. In: Proc. of RE 2005, pp. 157–166 (2005)
    • (2005) Proc. of RE , vol.2005 , pp. 157-166
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 12
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder Policy Specification Language
    • Sloman, M., Lobo, J., Lupu, E.C. (eds.), Springer, Heidelberg
    • Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)
    • (2001) POLICY 2001. LNCS , vol.1995 , pp. 18-39
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 14
    • 20444505719 scopus 로고    scopus 로고
    • MAC and UML for secure software design
    • ACM Press, New York
    • Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for secure software design. In: Proc. of FMSE 2004, pp. 75–85. ACM Press, New York (2004)
    • (2004) Proc. of FMSE 2004 , pp. 75-85
    • Doan, T.1    Demurjian, S.2    Ting, T.C.3    Ketterl, A.4
  • 15
    • 0024663629 scopus 로고
    • A framework for expressing models of security policy
    • IEEE Press, Los Alamitos
    • Dobson, J.E., McDermid, J.A.: A framework for expressing models of security policy. In: Proc. of Symp. on Sec. and Privacy, pp. 229–239. IEEE Press, Los Alamitos (1989)
    • (1989) Proc. of Symp. on Sec. and Privacy , pp. 229-239
    • Dobson, J.E.1    McDermid, J.A.2
  • 16
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. TISSEC 2(1), 34–64 (1999)
    • (1999) TISSEC , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 18
    • 84924413055 scopus 로고    scopus 로고
    • Security and Trust Requirements Engineering
    • Aldini, A., Gorrieri, R., Martinelli, F. (eds.), Springer, Heidelberg
    • Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)
    • (2005) FOSAD 2005. LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 19
    • 0031682433 scopus 로고    scopus 로고
    • On the formal definition of separation-of-duty policies and their composition
    • IEEE Press, Los Alamitos
    • Gligor, V.D., Gavrila, S.I., Ferraiolo, D.: On the formal definition of separation-of-duty policies and their composition. In: Proc. of Symp. on Sec. and Privacy, pp. 172–183. IEEE Press, Los Alamitos (1998)
    • (1998) Proc. of Symp. on Sec. and Privacy , pp. 172-183
    • Gligor, V.D.1    Gavrila, S.I.2    Ferraiolo, D.3
  • 20
    • 24344462080 scopus 로고    scopus 로고
    • A Framework for Modeling Privacy Requirements in Role Engineering
    • He, Q., Antón, A.I.: A Framework for Modeling Privacy Requirements in Role Engineering. In: Proc. of REFSQ 2003, pp. 137–146 (2003)
    • (2003) Proc. of REFSQ , vol.2003 , pp. 137-146
    • He, Q.1    Antón, A.I.2
  • 22
    • 57349119890 scopus 로고    scopus 로고
    • Enabling verification and conformance testing for access control model
    • ACM Press, New York
    • Hu, H., Ahn, G.: Enabling verification and conformance testing for access control model. In: Proc. of SACMAT 2008, pp. 195–204. ACM Press, New York (2008)
    • (2008) Proc. of SACMAT 2008 , pp. 195-204
    • Hu, H.1    Ahn, G.2
  • 23
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. TODS 26(2), 214–260 (2001)
    • (2001) TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.L.3    Subrahmanian, V.S.4
  • 25
    • 0035790711 scopus 로고    scopus 로고
    • Access control mechanisms for inter-organizational workflow
    • ACM Press, New York
    • Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow. In: Proc. of SACMAT 2001, pp. 66–74. ACM Press, New York (2001)
    • (2001) Proc. of SACMAT 2001 , pp. 66-74
    • Kang, M.H.1    Park, J.S.2    Froscher, J.N.3
  • 27
    • 62349090353 scopus 로고    scopus 로고
    • RT: A Role-based Trust-management Framework
    • IEEE Press, Los Alamitos
    • Li, N., Mitchell, J.C.: RT: A Role-based Trust-management Framework. In: Proc. of DISCEX 2003, vol. 1, pp. 201–212. IEEE Press, Los Alamitos (2003)
    • (2003) Proc. of DISCEX 2003 , vol.1 , pp. 201-212
    • Li, N.1    Mitchell, J.C.2
  • 28
    • 84942866002 scopus 로고    scopus 로고
    • Security and Privacy Requirements Analysis within a Social Setting
    • IEEE Press, Los Alamitos
    • Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proc. of RE 2003, pp. 151–161. IEEE Press, Los Alamitos (2003)
    • (2003) Proc. of RE 2003 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 29
    • 34548563765 scopus 로고    scopus 로고
    • Computer-Aided Support for Secure Tropos
    • Massacci, F., Mylopoulos, J., Zannone, N.: Computer-Aided Support for Secure Tropos. ASE 14(3), 341–364 (2007)
    • (2007) ASE , vol.14 , Issue.3 , pp. 341-364
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 31
    • 33746078483 scopus 로고    scopus 로고
    • Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank
    • MIT Press, Cambridge (to appear
    • Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (to appear, 2008)
    • Social Modeling for Requirements Engineering , pp. 2008
    • Massacci, F.1    Zannone, N.2
  • 32
    • 33750273034 scopus 로고    scopus 로고
    • Applying a Security Requirements Engineering Process
    • Gollmann, D., Meier, J., Sabelfeld, A. (eds.), Springer, Heidelberg
    • Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a Security Requirements Engineering Process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006)
    • (2006) ESORICS 2006. LNCS , vol.4189 , pp. 192-206
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 34
    • 85025160414 scopus 로고    scopus 로고
    • Wachtell, Lipton, Rosen, and Katz
    • Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (March 12, 2003)
    • Promontory Financial Group, Wachtell, Lipton, Rosen, and Katz. Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (March 12, 2003)
    • Report to the Board and Directors of Allied Irish Bank P.L.C.
  • 35
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press, New York
    • Ray, I., Li, N., France, R., Kim, D.-K.: Using UML to visualize role-based access control constraints. In: Proc. of SACMAT 2004, pp. 115–124. ACM Press, New York (2004)
    • (2004) Proc. of SACMAT 2004 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.-K.4
  • 36
    • 85025138424 scopus 로고    scopus 로고
    • Data Protection & Compliance in Context
    • Room, S.: Data Protection & Compliance in Context. BCS (2007)
    • (2007) BCS
    • Room, S.1
  • 37
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 38
    • 0037848141 scopus 로고    scopus 로고
    • Access Control: Policies, Models, and Mechanisms
    • Focardi, R., Gorrieri, R. (eds.), Springer, Heidelberg
    • Samarati, P., di Vimercati, S.D.C.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol. 2946, pp. 137–196. Springer, Heidelberg (2004)
    • (2004) FOSAD 2001. LNCS , vol.2946 , pp. 137-196
    • Samarati, P.1    Di Vimercati, S.D.C.2
  • 40
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • ACM Press, New York
    • Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of SACMAT 2006, pp. 139–149. ACM Press, New York (2006)
    • (2006) Proc. of SACMAT 2006 , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 41
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role-based environments
    • IEEE Press, Los Alamitos
    • Simon, R., Zurko, M.E.: Separation of duty in role-based environments. In: Proc. of CSFW 1997, pp. 183–194. IEEE Press, Los Alamitos (1997)
    • (1997) Proc. of CSFW 1997 , pp. 183-194
    • Simon, R.1    Zurko, M.E.2
  • 42
    • 44649149548 scopus 로고    scopus 로고
    • Analyzing and managing role-based access control policies
    • Sohr, K., Drouineaud, M., Ahn, G.-J., Gogolla, M.: Analyzing and managing role-based access control policies. TKDE 20(7), 924–939 (2008)
    • (2008) TKDE , vol.20 , Issue.7 , pp. 924-939
    • Sohr, K.1    Drouineaud, M.2    Ahn, G.-J.3    Gogolla, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.