TY - GEN
T1 - Enforcing a security pattern in stakeholder goal models
AU - Yu, Yijun
AU - Kaiya, Haruhiko
AU - Washizaki, Hironori
AU - Xiong, Yingfei
AU - Hu, Zhenjiang
AU - Yoshioka, Nobukazu
PY - 2008
Y1 - 2008
N2 - Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several goal-oriented stakeholder requirements.
AB - Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several goal-oriented stakeholder requirements.
KW - Goal models
KW - Model transformations
KW - RBAC
KW - Security patterns
UR - http://www.scopus.com/inward/record.url?scp=70349240293&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349240293&partnerID=8YFLogxK
U2 - 10.1145/1456362.1456366
DO - 10.1145/1456362.1456366
M3 - Conference contribution
AN - SCOPUS:70349240293
SN - 9781605583211
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 9
EP - 13
BT - Proceedings of the 4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
T2 - 4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Y2 - 27 October 2008 through 31 October 2008
ER -