A model-driven approach for the specification and analysis of access control policies

F. Massacci, N. Zannone

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

The last years have seen the definition of many languages, models and standards tailored to specify and enforce access control policies, but such frameworks do not provide methodological support during the policy specification process. In particular, they do not provide facilities for the analysis of the social context where the system operates. In this paper we propose a model-driven approach for the specification and analysis of access control policies. We build this framework on top of SI*, a modeling language tailored to capture and analyze functional and security requirements of socio-technical systems. The framework also provides formal mechanisms to assist policy writers and system administrators in the verification of access control policies and of the actual user-permission assignment. © 2008 Springer Berlin Heidelberg.
Original languageEnglish
Title of host publicationOn the Move to Meaningful Internet Systems: OTM 2008 - OTM 2008 Confederated International Conferences CoopIS, DOA, GADA, IS, and ODBASE 2008,Proceedings
EditorsZ. Tari, R. Meersman
PublisherSpringer Verlag
Pages1087-1103
ISBN (Print)9783540888727
DOIs
Publication statusPublished - 2008
Externally publishedYes
EventOTM 2008 Confederated International Conferences CoopIS, DOA, GADA, IS, and ODBASE 2008 - , Mexico
Duration: 9 Nov 200814 Nov 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceOTM 2008 Confederated International Conferences CoopIS, DOA, GADA, IS, and ODBASE 2008
Country/TerritoryMexico
Period9/11/0814/11/08

Fingerprint

Dive into the research topics of 'A model-driven approach for the specification and analysis of access control policies'. Together they form a unique fingerprint.

Cite this