首页> 外文会议>Conference on Network and Information Systems Security >From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis
【24h】

From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis

机译:从KAO到RBAC:从需求分析设计访问控制规则的案例研究

获取原文

摘要

This paper presents the KAOS2RBAC approach for Security Requirements Engineering. Starting from functional requirements, linked to a data model, the approach first identifies high level security goals. It then refines these security goals into security requirements linked to the functional model. Finally, these security requirements lead to the design of access control rules. An informal verification step checks that the rules give enough permission to enable all functional requirements. The approach takes benefit of the KAOS notations to link functional and non-functional goals, agents, data, and access control rules in a single requirements model. This enables traceability between security goals and the resulting access control rules. The approach is illustrated by a case study: an information system for medical urgency, taken from a real project.
机译:本文介绍了安全要求工程的KAOS2RBAC方法。 从功能要求开始,链接到数据模型,该方法首先识别高级安全目标。 然后,它将这些安全目标完善到与功能模型相关联的安全要求。 最后,这些安全要求导致访问控制规则的设计。 非正式验证步骤检查规则是否有足够的权限来启用所有功能要求。 该方法采用了KAOS符号,以在单个要求模型中链接功能和非功能目标,代理,数据和访问控制规则。 这使得安全目标与生成的访问控制规则之间的可追溯性。 该方法是通过案例研究说明的:从真正的项目中获取医疗紧迫感的信息系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号