Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023
DOI: 10.1145/3576915.3623196
|View full text |Cite
|
Sign up to set email alerts
|

Is Modeling Access Control Worth It?

David Basin,
Juan Guarnizo,
Srđan Krstic
et al.

Abstract: Implementing access control policies is an error-prone task that can have severe consequences for the security of software applications. Model-driven approaches have been proposed in the literature and associated tools have been developed with the goal of reducing the complexity of this task and helping developers to produce secure software efficiently. Nevertheless, there is a lack of empirical data supporting the advantages of model-driven security approaches over code-centric approaches, which are the de-fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
(26 reference statements)
0
1
0
Order By: Relevance
“…Model transformations are parametrized by a specific implementation technology and can target popular technology-specific infrastructure (e.g., authorization frameworks like JAAS [47]). MDD was shown to reduce system development time, and improve correctness [31] and security [17] with respect to a system specification.…”
Section: Introductionmentioning
confidence: 99%
“…Model transformations are parametrized by a specific implementation technology and can target popular technology-specific infrastructure (e.g., authorization frameworks like JAAS [47]). MDD was shown to reduce system development time, and improve correctness [31] and security [17] with respect to a system specification.…”
Section: Introductionmentioning
confidence: 99%