[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/775412.775425acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Model driven security for process-oriented systems

Published: 02 June 2003 Publication History

Abstract

Model Driven Architecture is an approach to increasing the quality of complex software systems based on creating high-level system models and automatically generating system architectures from the models. We show how this paradigm can be specialized to what we call Model Driven Security. In our specialization, a designer builds a system model along with security requirements, and automatically generates from this a complete, configured security infrastructure.We propose a modular approach to constructing modeling languages supporting this process, which combines languages for modeling system design with languages for modeling security. We present an application to constructing systems from process models, where we combine a UML-based process design language with a security modeling language for formalizing access control requirements. From models in the combined language, we automatically generate security architectures for distributed applications.

References

[1]
V. Atluri and W.-K. Huang. An authorization model for workflows. In Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, volume 1146 of LNCS, pages 44--64. Springer, 1996.
[2]
E. Bertino, E. Ferrari, and V. Atluri. An approach for the specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information Systems Security, 2(1):65--104, February 1999.
[3]
P. Epstein and R. S. Sandhu. Towards a UML Based Approach to Role Engineering. In Proceedings of 4th ACM Workshop on Role-Based Access Control, pages 145--152, 1999.
[4]
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3):224--274, 2001.
[5]
D. S. Frankel. Model Driven Architecture trademark : Applying MDA trademark to Enterprise Computing. John Wiley & Sons, 2003.
[6]
R. Hubert. Convergent Architecture: Building Model Driven J2EE Systems with UML. John Wiley & Sons, Inc., 2001.
[7]
J. Hunter. Java Servlet Programming, 2nd Edition. O'Reilly & Associates, 2001.
[8]
T. Jaeger. On the increasing importance of constraints. In Proceedings of 4th ACM Workshop on Role-Based Access Control, pages 33--42, 1999.
[9]
J. Jürjens. UMLsec: extending UML for secure systems development. In UML 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools. 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, volume 2460 of LNCS, pages 412--425. Springer, 2002.
[10]
S. Kandala and R. Sandhu, editors. Secure Role-Based Workflow Models, volume 215 of IFIP Conference Proceedings. Kluwer, 2002.
[11]
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools. 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, volume 2460 of LNCS, pages 426--441. Springer, 2002.
[12]
R. Monson-Haefel. Enterprise JavaBeans (3rd Edition). O'Reilly & Associates, 2001.
[13]
J. Rumbaugh, I. Jacobson, and G. Booch. The Unified Modeling Language Reference Manual. Addison-Wesley, 1998.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
June 2003
246 pages
ISBN:1581136811
DOI:10.1145/775412
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 June 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RBAC
  2. UML
  3. metamodeling
  4. model driven architecture
  5. security engineering

Qualifiers

  • Article

Conference

SACMAT03
Sponsor:

Acceptance Rates

SACMAT '03 Paper Acceptance Rate 23 of 63 submissions, 37%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)MDSSEDInformation and Software Technology10.1016/j.infsof.2023.107287163:COnline publication date: 1-Nov-2023
  • (2022)Empirically Evaluating the Effect of the Physics of Notations on Model ConstructionIEEE Transactions on Software Engineering10.1109/TSE.2021.306034448:7(2455-2475)Online publication date: 1-Jul-2022
  • (2022)Functional Modeling as a Basis for Classifying Security Threats2022 International Siberian Conference on Control and Communications (SIBCON)10.1109/SIBCON56144.2022.10003024(1-6)Online publication date: 17-Nov-2022
  • (2022)MBIPV: a model-based approach for identifying privacy violations from software requirementsSoftware and Systems Modeling10.1007/s10270-022-01072-322:4(1251-1280)Online publication date: 8-Dec-2022
  • (2021)Never trust, always verifyComputers and Security10.1016/j.cose.2021.102436110:COnline publication date: 29-Dec-2021
  • (2021)Model‐driven architecture based security analysisSystems Engineering10.1002/sys.2158124:5(307-321)Online publication date: 21-May-2021
  • (2020)A model-driven approach to ensure trust in the IoTHuman-centric Computing and Information Sciences10.1186/s13673-020-00257-310:1Online publication date: 14-Dec-2020
  • (2018)A grounded theory approach to security policy elicitationInformation & Computer Security10.1108/ICS-12-2017-008626:4(454-471)Online publication date: 8-Oct-2018
  • (2018)A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical SystemsSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-05345-1_37(428-442)Online publication date: 7-Dec-2018
  • (2017)Modeling and generation of secure component communications in AUTOSARProceedings of the Symposium on Applied Computing10.1145/3019612.3019682(1473-1480)Online publication date: 3-Apr-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media