An Approach for Verification of Secure Access Control Using Security Pattern

被引:0
|
作者
Gupta, Charu [1 ]
Singh, Rakesh Kumar [1 ]
Mohapatra, Amar Kumar [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi 110006, India
关键词
FORMALIZATION; ALLOY; MODEL;
D O I
10.1155/2022/1657627
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to OWASP-2021, more than 3,00,000 web applications have been detected for unauthenticated and unauthorised access leading to a breach of security trust. Security patterns are commonly used in web applications to address the problem of broken access. Web developers are not experts in implementing security patterns. Therefore, it is necessary to verify that the security pattern has been applied, specifying the original intent of the security pattern. In this paper, an approach has been proposed that analyses the behavioural aspect of security patterns to verify that it meets the security requirement of the web application. The proposed approach extracts the class diagram's structural properties, relations, associations, and security-related constraints and verifies it using the first-order predicate logic. Experiments have been conducted using class diagrams of security patterns to detect instances of broken access control early in the design phase. The proposed approach will help minimise the risk of unauthenticated and unauthorised access to a web application.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Security verification framework for NDN access control
    Yuan Fei
    Jiaqi Yin
    Lijun Yan
    Scientific Reports, 15 (1)
  • [2] A secure access control scheme with batch verification for VANETs
    Wang, Tao
    Kang, Li
    Duan, Jiang
    COMPUTER COMMUNICATIONS, 2023, 205 : 79 - 86
  • [3] On the specification, validation and verification of security in access control systems
    O'Shea, Greg, 1600, Oxford Univ Press, Oxford, United Kingdom (37):
  • [4] Verifying the Security Characteristics of a Secure Physical Access Control Protocol
    Carryl, Clyde
    Alhalabi, Bassem
    Khoshgoftaar, Taghi M.
    Bullard, Lofton
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (02)
  • [5] AKER: A Design and Verification Framework for Safe and Secure SoC Access Control
    Restuccia, Francesco
    Meza, Andres
    Kastner, Ryan
    2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
  • [6] Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies
    Meza, Andres
    Kastner, Ryan
    2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 198 - 202
  • [7] ON THE SPECIFICATION, VALIDATION AND VERIFICATION OF SECURITY IN ACCESS-CONTROL SYSTEMS
    OSHEA, G
    COMPUTER JOURNAL, 1994, 37 (05): : 437 - 448
  • [8] Access Control and Data Security in Online Document Verification System
    Reddy, Ravinder B.
    Kumar, Pavan C.
    Singh, Rajrupa
    Selvakumar, R.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 725 - 729
  • [9] Hierarchical access control using the secure filter
    Wu, KP
    Ruan, SJ
    Tseng, CK
    Lai, FP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (06) : 700 - 708
  • [10] Port Security & Access Control A systemic approach
    Andritsos, Fivos
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 36 - 43