2005
DOI: 10.1007/11555827_5
|View full text |Cite
|
Sign up to set email alerts
|

Specification and Validation of Authorisation Constraints Using UML and OCL

Abstract: Abstract. Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and historybased constraints in Object Constraint Language (OCL) which is a constraint specification … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 17 publications
0
23
0
Order By: Relevance
“…There are several works that concentrate on these kind of process internal consistency validation, e. g., [3,14]. Moreover, there are several approaches for analyzing access control constraints over UML models, e. g., [11,16,24]. These approaches are limited to simple access control modes, as it UML models are usually quite distant from business process descriptions comprising high level security and compliance goals.…”
Section: Related Workmentioning
confidence: 99%
“…There are several works that concentrate on these kind of process internal consistency validation, e. g., [3,14]. Moreover, there are several approaches for analyzing access control constraints over UML models, e. g., [11,16,24]. These approaches are limited to simple access control modes, as it UML models are usually quite distant from business process descriptions comprising high level security and compliance goals.…”
Section: Related Workmentioning
confidence: 99%
“…The most widely used constraints in the literature are Separation of duties, requirements and cardinality [4,5,6]. All these types of constraints are applicable or extendable in the CatBAC model.…”
Section: Representing Constraintsmentioning
confidence: 99%
“…As [11] observed, although there are several proposals for specifying role-based authorization constraints, "there is a lack of appropriate tool support for the validation, enforcement, and testing of role-based access control policies. Specifically, tools are needed which can be applied quite easily by a policy designer without too much deeper training."…”
Section: The Securemova Toolmentioning
confidence: 99%
“…Specifically, tools are needed which can be applied quite easily by a policy designer without too much deeper training." In response to this need, [11] shows how to employ the USE system to validate and test access control policies formulated in UML and OCL. We comment on this work in Section 7.…”
Section: The Securemova Toolmentioning
confidence: 99%
See 1 more Smart Citation