Model-Based Run-Time Checking of Security Permissions Using Guarded Objects

被引:0
|
作者
Jurjens, Jan
机构
来源
RUNTIME VERIFICATION | 2008年 / 5289卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we deal with the application of run-time checking to enforce requirements which, because of their nature, cannot be enforced statically. More specifically, it deals with the problem how to control access to objects within an object-oriented system at run-time in a way that enforces an overall security policy. It aims to improve on the ad-hoc (and often untrustworthy) way it is currently done in practice by automatically generating the run-time checks from a model-based specification of the system that captures the security policy. Concretely, the models are expressed in the UML security extension UMLsec, and the run-time checks that are generated for Java programs rely on Guarded Objects.
引用
收藏
页码:36 / 50
页数:15
相关论文
共 50 条
  • [21] An Investigation into Android Run-time Permissions from the End Users' Perspective
    Scoccia, Gian Luca
    Ruberto, Stefano
    Malavolta, Ivano
    Autili, Marco
    Inverardi, Paola
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 45 - 55
  • [22] An Aspect-Based Approach to Checking Design Constraints at Run-time
    Cheon, Yoonsik
    Avila, Carmen
    Roach, Steve
    Munoz, Cuauhtemoc
    Estrada, Neith
    Fierro, Valeria
    Romo, Jessica
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 223 - 228
  • [23] Implementation of Model-Based Development Tool and Run-time Engine for Digital Cockpit System
    Yoon, Changrak
    Park, Byoung-Jun
    Kim, Dohyun
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1064 - 1066
  • [24] Safe kernel extensions without run-time checking
    Necula, GC
    Lee, P
    PROCEEDINGS OF THE SECOND SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '96), 1996, : 229 - 243
  • [25] Run-Time Analysis of Temporal Constrained Objects
    Kannimoola, Jinesh M.
    Jayaraman, Bharat
    Achuthan, Krishnashree
    DECLARATIVE PROGRAMMING AND KNOWLEDGE MANAGEMENT, DECLARE 2017, 2018, 10997 : 20 - 36
  • [26] Adaptive Error and Sensor Management for Autonomous Vehicles: Model-Based Approach and Run-Time System
    Frtunikj, Jelena
    Rupanov, Vladimir
    Armbruster, Michael
    Knoll, Alois
    MODEL-BASED SAFETY AND ASSESSMENT, IMBSA 2014, 2014, 8822 : 166 - 180
  • [27] Run-Time Security Traceability for Evolving Systems
    Bauer, Andreas
    Juerjens, Jan
    Yu, Yijun
    COMPUTER JOURNAL, 2011, 54 (01): : 58 - 87
  • [28] Adaptive error and sensor management for autonomous vehicles: Model-based approach and run-time system
    Frtunikj, Jelena
    Rupanov, Vladimir
    Armbruster, Michael
    Knoll, Alois
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8822 : 166 - 180
  • [29] Mutation Analysis and Model Checking Guided Test Generation for SoC Run-Time Monitors
    Srinivasan, Suriya
    Vemuri, Ranga
    2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID, 2023, : 240 - 245
  • [30] Run-Time Probabilistic Model Checking for Failure Prediction: A Smart Lift Case Study
    Xin, Xin
    Keoh, Sye Loong
    Sevegnani, Michele
    Saerbeck, Martin
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,