2003
DOI: 10.1016/s0950-5849(03)00097-1
|View full text |Cite
|
Sign up to set email alerts
|

Modelling access policies using roles in requirements engineering

Abstract: Pressures are increasing on organisations to take an early and more systematic approach to security. A key to enforcing security is to restrict access to valuable assets. We regard access policies as security requirements that specify such restrictions. Current requirements engineering methods are generally inadequate for eliciting and analysing these types of requirements, because they do not allow complex organisational structures and procedures that underlie policies to be represented adequately. This paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2004
2004
2010
2010

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…It would be useful to have some traceability between constraints and the threat(s) they counter; we are looking at the representation Rashid et al propose in [24] and at an adaptation of the multi-dimensional concerns matrix proposed by Ossher and Tarr in their work describing ondemand application remodularization [22]. Better integration with some of our colleagues' research, such as the organizational access control work of Crook [4] and the abuse analysis work of Lin [17], is desired. As noted in the related work section, the expressive powers of this approach and o [15]) need to be better understood.…”
Section: Discussionmentioning
confidence: 99%
“…It would be useful to have some traceability between constraints and the threat(s) they counter; we are looking at the representation Rashid et al propose in [24] and at an adaptation of the multi-dimensional concerns matrix proposed by Ossher and Tarr in their work describing ondemand application remodularization [22]. Better integration with some of our colleagues' research, such as the organizational access control work of Crook [4] and the abuse analysis work of Lin [17], is desired. As noted in the related work section, the expressive powers of this approach and o [15]) need to be better understood.…”
Section: Discussionmentioning
confidence: 99%
“…However, information systems engineering and security engineering research communities traditionally work independently. On the one hand, information systems engineering techniques and methodologies do not consider security as an important issue, although they have integrated concepts such as reliability and performance and they usually fail to provide precise enough semantics to support the analysis and design of security requirements and properties (Crook et al, 2003;Mouratidis, 2004). On the other hand, security engineering research has mainly produced formal and theoretical methods, which are difficult to understand by non-security experts and which, apart from security, they only consider limited aspects of the system.…”
Section: Independent Solutionsmentioning
confidence: 99%
“…In addition, Van Lamsweerde (2004) defines also the notion of antimodels, models that capture attackers, their goals and capabilities. Similarly, Crook et al (2003) introduce the notion of antirequirements to represent the requirements of malicious attackers. Antirequirements are expressed in terms of the problem domain phenomena and are satisfied when the security threats imposed by the attacker are realised in any one instance of the problem.…”
Section: Problems In Current State-of-the-artmentioning
confidence: 99%
See 1 more Smart Citation
“…Without the context of accomplishing one or more tasks in different privilege levels, information access makes no sense. The rational of using a combined multilevel and multilateral model is further supported by the fact that a job responsibility is determined by the level of authority and the division of work [14]. The former prevents information flow downwards and the latter prevents information flow across, being concerned about workgroup membership and job speciality under our further refinement.…”
Section: Overview Of a Layered Security Modelmentioning
confidence: 99%