Enforcing a security pattern in stakeholder goal models

Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, Nobukazu Yoshioka

研究成果: Conference contribution

13 引用 (Scopus)

抜粋

Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order to facilitate early detection and resolution of security problems, in this paper, we formally describe a role-based access control (RBAC) as a pattern that may occur in stakeholder requirements models. We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations. Applied to a number of requirements models published in literature, the tool automates the detection and resolution of the security pattern in several goal-oriented stakeholder requirements.

元の言語English
ホスト出版物のタイトルProceedings of the 4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
ページ9-13
ページ数5
DOI
出版物ステータスPublished - 2008 12 1
イベント4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 - Alexandria, VA, United States
継続期間: 2008 10 272008 10 31

出版物シリーズ

名前Proceedings of the ACM Conference on Computer and Communications Security
ISSN(印刷物)1543-7221

Conference

Conference4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
United States
Alexandria, VA
期間08/10/2708/10/31

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

フィンガープリント Enforcing a security pattern in stakeholder goal models' の研究トピックを掘り下げます。これらはともに一意のフィンガープリントを構成します。

  • これを引用

    Yu, Y., Kaiya, H., Washizaki, H., Xiong, Y., Hu, Z., & Yoshioka, N. (2008). Enforcing a security pattern in stakeholder goal models. : Proceedings of the 4th ACM Workshop on Quality of Protection, QoP'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 (pp. 9-13). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1456362.1456366