Towards an Analytical Role Modelling Framework for Security Requirements
نویسندگان
چکیده
Pressures are increasing on organisations to take a more systematic approach to incorporating security into their software development process. The key to this is analysing security requirements early on, rather than treating security as an add-on, as is often the case. An important component of security requirements is access control, and roles have been found to provide an effective basis for defining access restrictions. Current requirements engineering methods are generally inadequate for eliciting and analysing these types of requirements, because they do not allow the complex organisational structures and procedures that form the basis of role-based security policy to be represented adequately. In this paper, we outline the concepts that underpin role-based access control, and relate these to organisational theory, to give a basis for defining roles. We then propose an analytical role modelling framework that enables us to model and analyse access restrictions based on these concepts. The framework is illustrated by a detailed example taken from the healthcare domain.
منابع مشابه
A Knowledge-Oriented Approach to Security Requirements Engineering for E-Voting System
In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System. The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency towards security experts can be reduced. In this paper w...
متن کاملSecurity (Hyper-)properties in Workflow Systems: From Specification to Verification
Provable security guarantees for software systems are highly desirable. Our work aims at improving and integrating existing formal verification techniques into a framework for the specification and verification of typical security requirements of large-scale, distributed workflow systems. Challenges include the uniform modelling of different types of security requirements, the decomposition of ...
متن کاملA role and context based security model
Security requirements approached at the enterprise level initiate the need for models that capture the organisational and distributed aspects of information usage. Such models have to express organisation-specific security policies and internal controls aiming to protect information against unauthorised access and modification, and against usage of information for unintended purposes. This diss...
متن کاملModeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies can be covered by a single security policy model (UCON). Based on this policy model, the core of this contribution consists in the specialization of the SECTET framework for Model Driven Security towards a Domain Architecture t...
متن کاملTrust: From Cognition to Conceptual Models and Design
Dealing with trust in eGov services p. 18 Trusted interaction : user control and system responsibilities in interaction design for information systems p. 20 Designing security requirements models through planning p. 33 Towards a comprehensive framework for secure systems development p. 48 Role-based modelling of interactions in database applications p. 63 Incremental evaluation of OCL constrain...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002