A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

被引:7
|
作者
Yu, Lijun [1 ]
France, Robert [1 ]
Ray, Indrakshi [1 ]
Ghosh, Sudipto [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ICECCS.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML. designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a lightweight, scenario-based UML design analysis approach we developed can be used to rigorously analyze a UML, design to uncover security policy violations. In the method, a UML design class model, in which security policies and operation specifications are expressed in the Object Constraint Language (OCL), is analyzed against a set of scenarios describing behaviors that adhere to and that violate security policies. The method includes a technique for generating scenarios. We illustrate how the method can be applied through an example involving role-based access control policies.
引用
收藏
页码:126 / 135
页数:10
相关论文
共 50 条
  • [21] Checking Network Security Policy Violations via Natural Language Questions
    Shi, Pinyi
    Song, Yongwook
    Fei, Zongming
    Griffioen, James
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [22] Impact of negative emotions on violations of information security policy and possible mitigations
    Zhen, Jie
    Xie, Zongxiao
    Dong, Kunxiang
    Chen, Lin
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (11) : 2342 - 2354
  • [23] UML based Security Function Policy Verification Method for Requirements Specification
    Noro, Atsushi
    Matsuura, Saeko
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833
  • [24] NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS
    Siponen, Mikko
    Vance, Anthony
    MIS QUARTERLY, 2010, 34 (03) : 487 - 502
  • [25] Neutralization: New insights into the problem of employee information systems security policy violations
    Siponen M.
    Vance A.
    MIS Quarterly: Management Information Systems, 2010, 34 (SPEC. ISSUE 3): : 487 - 502
  • [26] An examination of factors that influence the number of information security policy violations in Qatari organizations
    Al-Mukahal, Hasan M.
    Alshare, Khaled
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (01) : 102 - 118
  • [27] Models for Storage in Database Backends A Rigorous Approach for Formally-Correct Designs
    Schiebelbein, Edgard
    Hatia, Saalik
    Bieniusa, Annette
    Petri, Gustavo
    Ferreira, Carla
    Shapiro, Marc
    PROCEEDINGS OF THE ELEVENTH ACM WORKSHOP ON PRINCIPLES AND PRACTICE OF CONSISTENCY FOR DISTRIBUTED DATA, PAPOC 2024, 2024, : 58 - 66
  • [28] A Metric-Based Approach for Anti-pattern Detection in UML Designs
    Fourati, Rahma
    Bouassida, Nadia
    Ben Abdallah, Hanene
    COMPUTER AND INFORMATION SCIENCE 2011, 2011, 364 : 17 - 33
  • [29] Security Policy Alignment: A Formal Approach
    Pieters, Wolter
    Dimkov, Trajce
    Pavlovic, Dusko
    IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 275 - 287
  • [30] Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
    Vance, Anthony
    Siponen, Mikko T.
    Straub, Detmar W.
    INFORMATION & MANAGEMENT, 2020, 57 (04)