A Rigorous Approach to Uncovering Security Policy Violations in UML Designs

被引:7
|
作者
Yu, Lijun [1 ]
France, Robert [1 ]
Ray, Indrakshi [1 ]
Ghosh, Sudipto [1 ]
机构
[1] Colorado State Univ, Ft Collins, CO 80523 USA
关键词
D O I
10.1109/ICECCS.2009.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML. designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a "closed-world" view of the system (i.e., a system in which there are no inputs from external sources). In this paper we show how a lightweight, scenario-based UML design analysis approach we developed can be used to rigorously analyze a UML, design to uncover security policy violations. In the method, a UML design class model, in which security policies and operation specifications are expressed in the Object Constraint Language (OCL), is analyzed against a set of scenarios describing behaviors that adhere to and that violate security policies. The method includes a technique for generating scenarios. We illustrate how the method can be applied through an example involving role-based access control policies.
引用
收藏
页码:126 / 135
页数:10
相关论文
共 50 条
  • [41] The policy of national reconciliation in Algeria: a security approach
    Kedidir, Mansour
    ANNEE DU MAGHREB, 2021, 26
  • [42] A Novelty Approach for Checking Consistency of Security Policy
    Liu Changhua
    Li Yaqin
    Liao Zhensong
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 319 - +
  • [43] Uncovering Xi Jinping's Policy Agenda: Text As Data Approach
    Lim, Jaehwan
    Ito, Asei
    Zhang, Hongyong
    DEVELOPING ECONOMIES, 2025, 63 (01): : 9 - 46
  • [44] Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective
    Ali, Rao Faizan
    Dominic, P. D. D.
    JOURNAL OF INFORMATION SCIENCE, 2024, 50 (01) : 254 - 272
  • [45] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [46] A meta model approach using UML for task assignment policy in software process
    Lee, SJ
    Shim, JH
    Wu, CS
    APSEC 2002: NINTH ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE, 2002, : 376 - 382
  • [47] Using Cognitive Dissonance Theory to Explain Information Security Policy Violations Emergent Research Forum (ERF)
    Talebi, Nasim
    Jozani, Mohsen M.
    Herath, Tejaswini
    Rao, H. Raghav
    AMCIS 2018 PROCEEDINGS, 2018,
  • [48] A transformation-driven approach to the verification of security policies in Web designs
    Guerra, Esther
    Sanz, Daniel
    Diaz, Paloma
    Aedo, Ignacio
    WEB ENGINEERING, PROCEEDINGS, 2007, 4607 : 269 - +
  • [49] A Formal Approach for Network Security Policy Relevancy Checking
    Ben Ftima, Fakher
    Karoui, Kamel
    Ben Ghezala, Henda
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 555 - 564
  • [50] Developing an Information Security Policy: A Case Study Approach
    Alqahtani, Fayez Hussain
    4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697