An approach to analyze software security requirements in ABAC model

被引:0
|
作者
Thanh-Nhan Luong [1 ,2 ]
Dinh-Hieu Vo [2 ]
Ninh-Thuan Truong [2 ]
机构
[1] Univ Med & Pharm Haiphong, Haiphong, Vietnam
[2] Hanoi Univ Engn & Technol, VNU, Hanoi, Vietnam
关键词
ABAC; checking; code access security;
D O I
10.1109/nics48868.2019.9023902
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security has been a crucial aspect of most applications especially, critical-safety softwares. In fact, losing or leaking of sensitive data can lead to huge losses for organizations so software developers must always find ways to ensure the security properties for their softwares. In practice, attribute-based access control (ABAC) has been an effective, flexible and popular method to mitigate the risks of unauthorized accesses to resources in large and complex systems. In this paper, we introduce an approach for checking ABAC rules from the source code of an application software against to its requirement specification. Our work includes of formal definitions about ABAC policy and access rules in softwares, a method to analyze access rules from the source code, and algorithms to analyze and validate access rules supporting for the verification process. The proposed approach can help programmers to detect the inconsistency between specification and implementation of a software system. We also illustrate our approach with an example in a medical information management system.
引用
收藏
页码:184 / 189
页数:6
相关论文
共 50 条
  • [1] An Integrated Model for Software Security Testing Requirements
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Rao, Liping
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1891 - 1895
  • [2] The security requirements behavior model for trustworthy software
    Saleh, Kassem
    Habil, Maryam
    [J]. 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 235 - +
  • [3] A Novel Approach for Acquiring Training and Software Security Requirements
    Fujs, Damjan
    Vrhovec, Simon
    Vavpotic, Damjan
    [J]. EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [4] A classification approach for software requirements towards maintainable security
    Kadebu, Prudence
    Sikka, Sunil
    Tyagi, Rajesh Kumar
    Chiurunge, Panashe
    [J]. SCIENTIFIC AFRICAN, 2023, 19
  • [5] A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
    Wang, Wentao
    Hussein, Nesrin
    Gupta, Arushi
    Wang, Yinglin
    [J]. 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2017, : 443 - 446
  • [6] Security analysis of ABAC under an administrative model
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    [J]. IET INFORMATION SECURITY, 2019, 13 (02) : 96 - 103
  • [7] ABAC-Based Security Model for DDS
    Kim, Hwimin
    Kim, Dae-Kyoo
    Alaerjan, Alaa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3113 - 3124
  • [8] SETAM: An Integrated Model for Software Security Testing Requirements Behavior
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Hu, Bin
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4435 - 4442
  • [9] Risk-Based Security Requirements Model for Web Software
    Ezenwoye, Onyeka
    Liu, Yi
    [J]. 2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 232 - 237
  • [10] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122