Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering 2012
DOI: 10.1145/2393596.2393608
|View full text |Cite
|
Sign up to set email alerts
|

Automated extraction of security policies from natural-language software documents

Abstract: Access Control Policies (ACP) specify which principals such as users have access to which resources. Ensuring the correctness and consistency of ACPs is crucial to prevent security vulnerabilities. However, in practice, ACPs are commonly written in Natural Language (NL) and buried in large documents such as requirements documents, not amenable for automated techniques to check for correctness and consistency. It is tedious to manually extract ACPs from these NL documents and validate NL functional requirements… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
65
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 103 publications
(66 citation statements)
references
References 35 publications
0
65
0
1
Order By: Relevance
“…Finally, the Text2Pol-icy tool attempts to extract access control policies (ACP) from natural language documents to reduce the manual effort for this tedious but important security task. Using both syntactic and semantic methods, this tool achieves accuracies ranging between 80 and 90 % for ACP sentence, rule, and action extraction [55]. The generation of models from natural language requirements has also been studied; for example, Friedrich et al [17] combined and augmented several NLP tools to generate BPMN models, resulting in an accuracy of 77 % on a data set of textmodel pairs from industry and textbooks.…”
Section: Natural Language Processing For Rementioning
confidence: 99%
“…Finally, the Text2Pol-icy tool attempts to extract access control policies (ACP) from natural language documents to reduce the manual effort for this tedious but important security task. Using both syntactic and semantic methods, this tool achieves accuracies ranging between 80 and 90 % for ACP sentence, rule, and action extraction [55]. The generation of models from natural language requirements has also been studied; for example, Friedrich et al [17] combined and augmented several NLP tools to generate BPMN models, resulting in an accuracy of 77 % on a data set of textmodel pairs from industry and textbooks.…”
Section: Natural Language Processing For Rementioning
confidence: 99%
“…For example, Zhong et al [70] employed NLP and machine learning (ML) techniques to infer resource specifications from API documents. Xiao et al [58] used shallow parsing techniques to infer Access Control Policy (ACP) rules from natural language text in use cases. Tan et al [50] applied an NLP-and ML-based approach to test Javadoc comments against implementations.…”
Section: Text Analysis For Software Engineeringmentioning
confidence: 99%
“…However, to the best of our knowledge, none of the previous work analyzes software diagnostic messages caused by configuration errors nor evaluates their adequacy. Our ConfDiagDetector technique applies NLP techniques to a different problem domain by checking the semantic similarity between two sentences (Section 2.3.1), rather than extracting useful properties from natural language properties [19,43,44,58].…”
Section: Text Analysis For Software Engineeringmentioning
confidence: 99%
“…Past applications of NLP have sought to parse privacy policies into machine-readable representations (Brodie et al, 2006) or extract subpolicies from larger documents (Xiao et al, 2012). Machine learning has been applied to assess certain attributes of policies (Costante et al, 2012;Ammar et al, 2012;Costante et al, 2013;Zimmeck and Bellovin, 2013).…”
Section: Introductionmentioning
confidence: 99%