Security

Model-Based Design and Analysis of Permission-Based Security

Free registration required

Executive Summary

To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions rely on certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. The authors address this problem using an approach which embeds security permissions in UML models and supports model based security analysis by providing consistency checks. The presented formal framework also prepares the ground for an automated analysis of underlying protocols for managing security-critical permissions, for example with the help of first-order logic theorem proving.

  • Format: PDF
  • Size: 130.54 KB