A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

被引:7
|
作者
Yu, Lijun [1 ]
France, Robert [1 ]
Ray, Indrakshi [1 ]
Ghosh, Sudipto [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ICECCS.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML. designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a lightweight, scenario-based UML design analysis approach we developed can be used to rigorously analyze a UML, design to uncover security policy violations. In the method, a UML design class model, in which security policies and operation specifications are expressed in the Object Constraint Language (OCL), is analyzed against a set of scenarios describing behaviors that adhere to and that violate security policies. The method includes a technique for generating scenarios. We illustrate how the method can be applied through an example involving role-based access control policies.
引用
收藏
页码:126 / 135
页数:10
相关论文
共 50 条
  • [1] Security consistency in UML designs
    Pilskalns, Orest
    Williams, Daniel
    Aracic, Damir
    Andrews, Anneliese
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 1, REGULAR PAPERS/PANELS, PROCEEDINGS, 2006, : 351 - +
  • [2] Towards a Rigorous Approach to UML-Based Development
    Liu, Zhiming
    He Jifeng
    Li, Xiaoshan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 130 : 57 - 77
  • [3] IS Security Policy Violations: A Rational Choice Perspective
    Vance, Anthony
    Siponen, Mikko
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2012, 24 (01) : 21 - 41
  • [4] Security Policy Violations in SDN Data Plane
    Li, Qi
    Chen, Yanyu
    Lee, Patrick P. C.
    Xu, Mingwei
    Ren, Kui
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (04) : 1715 - 1727
  • [5] RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS
    Cappellozza, Alexandre
    da Silva, Camila Bernardo
    Medeiros, Luciana Arantes
    de Moraes, Gustavo Herminio Salati Marcondes
    Perez, Gilberto
    INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
  • [6] EXAMINING THE NEURAL BASIS OF INFORMATION SECURITY POLICY VIOLATIONS: A NONINVASIVE BRAIN STIMULATION APPROACH
    Turel, Ofir
    He, Qinghua
    Wen, Yatong
    MIS QUARTERLY, 2021, 45 (04) : 1715 - 1744
  • [7] A New approach to Detect Safety Violations in UML Statechart Models
    Prashanth, C. M.
    Shet, K. Chandrashekar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 167 - 174
  • [8] Uncovering Information Flow Policy Violations in C Programs (Extended Abstract)
    Cassel, Darion
    Huang, Yan
    Jia, Limin
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 26 - 46
  • [9] On the Content Security Policy Violations due to the Same-Origin Policy
    Some, Dohere Francis
    Bielova, Nataliia
    Rezk, Tamara
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 877 - 886
  • [10] Live Forensics Analysis: Violations of Business Security Policy
    Tanwar, Govind Singh
    Poonia, Ajeet Singh
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 971 - 976