2009
DOI: 10.1007/978-3-642-03354-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Agile Development of Authorization Rules for SME Applications

Abstract: Abstract. Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still difficult with Agile development, though: heavy-weight processes put the improvements of Agile development at risk. We propose Agile security engineering and increased end-user involvement to improve Agile development with respect to authorization policy development. To support the authorization policy development, we introduce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…In order to support the authorization policy development, Bartsch (2008) introduce a simple and readable authorization rules language implemented in a Ruby on Rails (http://www. rubyonrails.org) authorization plug-in that is employed in workflow application.…”
Section: Discussionmentioning
confidence: 99%
“…In order to support the authorization policy development, Bartsch (2008) introduce a simple and readable authorization rules language implemented in a Ruby on Rails (http://www. rubyonrails.org) authorization plug-in that is employed in workflow application.…”
Section: Discussionmentioning
confidence: 99%
“…[10]). The special requirements of the targeted environment with regard to security engineering are also analyzed by Bartsch et al in [4] addressing authorization rules for SME applications providing a dedicated DSML and a corresponding enforcement implementation.…”
Section: Creation Of Security Conceptmentioning
confidence: 99%
“…Those projects are confronted with scarce resources, especially on expert knowledge outside the organization's core competences. Hence, security engineering activities have to be addressed on the basis of restricted knowledge, delivering quick results and a flexible integration in existing tool chains and processes [4]. A vital part of the security engineering activities in these projects is the assessment and treatment of IT security risks [2].…”
Section: Introductionmentioning
confidence: 99%