Generating monitors for usage control
Author:
Abstract
Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a model driven approach to solve this problem based on graph transformation. Using the precise semantics of graph transformation, access control models and policies can be formally analyzed in an early phase. The existing solutions on automated verification and efficient implementation of graph transformation show that this approach is suitable to address security concerns throughout the overall software development process.
- Citation
- BibTeX
Deckwerth, F.,
(2013).
Generating monitors for usage control.
In:
Wagner, S. & Lichter, H.
(Hrsg.),
Software Engineering 2013 - Workshopband.
Bonn:
Gesellschaft für Informatik e.V..
(S. 577-582).
@inproceedings{mci/Deckwerth2013,
author = {Deckwerth, Frederik},
title = {Generating monitors for usage control},
booktitle = {Software Engineering 2013 - Workshopband},
year = {2013},
editor = {Wagner, Stefan AND Lichter, Horst} ,
pages = { 577-582 },
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn}
}
author = {Deckwerth, Frederik},
title = {Generating monitors for usage control},
booktitle = {Software Engineering 2013 - Workshopband},
year = {2013},
editor = {Wagner, Stefan AND Lichter, Horst} ,
pages = { 577-582 },
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn}
}
Haben Sie fehlerhafte Angaben entdeckt? Sagen Sie uns Bescheid: Send Feedback
More Info
ISBN: 978-3-88579-609-1
ISSN: 1617-5468
xmlui.MetaDataDisplay.field.date: 2013
Language: (en)
Content Type: Text/Conference Paper