Deriving authorizations from process analysis in legacy information systems

被引:0
|
作者
Castano, S
Fugini, MG
机构
关键词
discretionary access control; authorization analysis; legacy information systems;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The problem of analyzing security requirements is to be addressed in legacy systems when planned restructuring interventions involve also security aspects. In this paper, we propose a three-level model for authorization analysis and an associated method to extract authorizations from legacy systems. The model allows the security administrator to analyze process authorizations for database accesses at different granularity levels of the involved data. The connection between processes and user roles within organizational units of the legacy system are discussed. The initial results of an experimentation of the approach on a set of processes and databases of the Italian Public Administration information systems are presented.
引用
收藏
页码:56 / 67
页数:12
相关论文
共 50 条
  • [1] An approach to deriving global authorizations in federated database systems
    Castano, S
    [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 58 - 75
  • [2] Deriving Event Logs from Legacy Software Systems
    Breitmayer, Marius
    Arnold, Lisa
    La Rocca, Stephan
    Reichert, Manfred
    [J]. PROCESS MINING WORKSHOPS, ICPM 2022, 2023, 468 : 409 - 421
  • [3] Introducing business process into legacy information systems
    Borges, MRS
    Vincent, AF
    Penadés, MC
    Araujo, RM
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2005, 3649 : 452 - 457
  • [4] The influence of legacy information systems on business process change strategies
    Light, B
    Holland, C
    Gibson, N
    [J]. ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 527 - 529
  • [5] From legacy systems towards modern health information systems
    Bercic, B
    Zelic, I
    Cerkvenik, G
    Slavec, S
    Rems, M
    [J]. MEDINFO '98 - 9TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 1998, 52 : 931 - 934
  • [6] Deriving Normalized Systems Elements from Business Process Models
    Van Nuffel, Dieter
    Mannaert, Herwig
    De Backer, Carlos
    Verelst, Jan
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 27 - 32
  • [7] A multi-perspective framework for the analysis of legacy information systems
    Castano, S
    De Antonellis, V
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, 1997, 1250 : 117 - 130
  • [8] Deriving an object model from legacy FORTRAN code
    Subramaniam, GV
    Byrne, EJ
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1996, : 3 - 12
  • [9] Deriving word meaning from written context: a process analysis
    Fukkink, RG
    [J]. LEARNING AND INSTRUCTION, 2005, 15 (01) : 23 - 43
  • [10] Process mining through dynamic analysis for modernising legacy systems
    Perez-Castillo, R.
    Weber, B.
    de Guzman, I. G. -R.
    Piattini, M.
    [J]. IET SOFTWARE, 2011, 5 (03) : 304 - 319