首页> 外文会议>2011 Conference on Network and Information Systems Security >From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis
【24h】

From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis

机译:从KAOS到RBAC:基于需求分析设计访问控制规则的案例研究

获取原文

摘要

This paper presents the KAOS2RBAC approach for Security Requirements Engineering. Starting from functional requirements, linked to a data model, the approach first identifies high level security goals. It then refines these security goals into security requirements linked to the functional model. Finally, these security requirements lead to the design of access control rules. An informal verification step checks that the rules give enough permission to enable all functional requirements. The approach takes benefit of the KAOS notations to link functional and non-functional goals, agents, data, and access control rules in a single requirements model. This enables traceability between security goals and the resulting access control rules. The approach is illustrated by a case study: an information system for medical urgency, taken from a real project.
机译:本文介绍了用于安全需求工程的KAOS2RBAC方法。该方法从链接到数据模型的功能需求开始,首先确定高级别的安全目标。然后,将这些安全目标细化为链接到功能模型的安全要求。最后,这些安全要求导致了访问控制规则的设计。非正式验证步骤检查规则是否给予足够的权限以启用所有功能要求。该方法利用KAOS表示法在单个需求模型中链接功能和非功能目标,代理,数据和访问控制规则。这样就可以在安全目标和生成的访问控制规则之间进行追溯。案例研究说明了该方法:一个来自实际项目的医疗紧迫性信息系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号