A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

被引:7
|
作者
Yu, Lijun [1 ]
France, Robert [1 ]
Ray, Indrakshi [1 ]
Ghosh, Sudipto [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ICECCS.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML. designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a lightweight, scenario-based UML design analysis approach we developed can be used to rigorously analyze a UML, design to uncover security policy violations. In the method, a UML design class model, in which security policies and operation specifications are expressed in the Object Constraint Language (OCL), is analyzed against a set of scenarios describing behaviors that adhere to and that violate security policies. The method includes a technique for generating scenarios. We illustrate how the method can be applied through an example involving role-based access control policies.
引用
收藏
页码:126 / 135
页数:10
相关论文
共 50 条
  • [31] Exploring the factors influencing information security policy compliance and violations: A systematic literature review
    Balagopal, N.
    Mathew, Saji K.
    COMPUTERS & SECURITY, 2024, 147
  • [32] The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
    Sarkar, Sumantra
    Vance, Anthony
    Ramesh, Balasubramaniam
    Demestihas, Menelaos
    Wu, Daniel Thomas
    INFORMATION SYSTEMS RESEARCH, 2020, 31 (04) : 1240 - 1259
  • [33] Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations
    Siponen, Mikko
    Vance, Anthony
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2014, 23 (03) : 289 - 305
  • [34] Towards a Reliable and Smart Approach for Detecting and Resolving Security Violations within SDWN
    Sahbi, Amina
    Jaidi, Faouzi
    Bouhoula, Adel
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 884 - 889
  • [35] Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory
    Sedaghatbaf, Ali
    Azgomi, Mohammad Abdollahi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 141 - 153
  • [36] A Test-Driven Approach for Security Designs of Automated Vehicles
    Suo, Dajiang
    Sarma, Sanjay E.
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 26 - 32
  • [37] A policy based approach to security for the Semantic Web
    Kagal, L
    Finin, T
    Joshi, A
    SEMANTIC WEB - ISWC 2003, 2003, 2870 : 402 - 418
  • [38] A grounded theory approach to security policy elicitation
    Foley, Simon N.
    Rooney, Vivien
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 454 - 471
  • [39] A policy-oriented approach to energy security
    Kucharski, Jeffrey
    Unesaki, Hironobu
    5th Sustainable Future for Human Security (SustaiN 2014), 2015, 28 : 27 - 36
  • [40] Behavioral Approach to Information Security Policy Compliance
    Mady, Ashraf
    Gupta, Saurabh
    AMCIS 2017 PROCEEDINGS, 2017,