2009 14th IEEE International Conference on Engineering of Complex Computer Systems 2009
DOI: 10.1109/iceccs.2009.16
|View full text |Cite
|
Sign up to set email alerts
|

A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

Abstract: There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a li… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 19 publications
(28 reference statements)
0
6
0
Order By: Relevance
“…Several counterexamples are generated to examine the policy which they are interested in. Yu et al [16] propose scenarios in terms of state transitions to uncover violations in security policies. Such approaches and Alloy analyzer (unlike model checkers) have advantages over model checking tools since model checking merely considers closed-world view of systems [16]; that means no inputs are taken from external resources.…”
Section: Rbac Constraints and Alloymentioning
confidence: 99%
See 1 more Smart Citation
“…Several counterexamples are generated to examine the policy which they are interested in. Yu et al [16] propose scenarios in terms of state transitions to uncover violations in security policies. Such approaches and Alloy analyzer (unlike model checkers) have advantages over model checking tools since model checking merely considers closed-world view of systems [16]; that means no inputs are taken from external resources.…”
Section: Rbac Constraints and Alloymentioning
confidence: 99%
“…Yu et al [16] propose scenarios in terms of state transitions to uncover violations in security policies. Such approaches and Alloy analyzer (unlike model checkers) have advantages over model checking tools since model checking merely considers closed-world view of systems [16]; that means no inputs are taken from external resources. In their approach, all operation calls take the form of scenarios and a system state is a configuration of objects.…”
Section: Rbac Constraints and Alloymentioning
confidence: 99%
“…Yu et al [6] propose a technique to uncover violations in security rules specified by using RBAC. Their technique implements role activation and SoD constraints and role hierarchy using UML and OCL.…”
Section: Semi-formal Approachesmentioning
confidence: 99%
“…In turn, one can specify and validate a (sub)set of access control rules. A few example studies are [6][7] [8][9] [10]. In the sequel, we call these semiformal techniques.…”
Section: Introductionmentioning
confidence: 99%
“…The approach also builds upon our previous work on the Scenario-based UML Design Analysis (SUDA) approach [22], [23]. A designer uses SUDA to check whether a specific functional scenario is supported by a design class model in which operations are specified using the OCL.…”
Section: Introductionmentioning
confidence: 99%