Model-based design and analysis of permission-based security

被引:0
|
作者
Jürjens, J [1 ]
Lehrhuber, M [1 ]
Wimmel, G [1 ]
机构
[1] Tech Univ Munich, Inst Informat, D-85748 Garching, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions rely on certain restrictions based on the workflows the system is designed for. It is not always easy to see if workflows and the design of the security permissions for the system fit together. We address this problem using an approach which embeds security permissions in UML models and supports model-based security analysis by providing consistency checks. The presented formal framework also prepares the ground for an automated analysis of underlying protocols for managing security-critical permissions, for example with the help of first-order logic theorem proving. We explain how the models can be securely implemented in a language such as Java.
引用
收藏
页码:224 / 233
页数:10
相关论文
共 50 条
  • [1] Towards Formal Analysis of the Permission-based Security Model for Android
    Shin, Wook
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 87 - 92
  • [2] Formal Analysis of Android's Permission-Based Security Model
    Betarte, Gustavo
    Campo, Juan
    Luna, Carlos
    Romano, Agustin
    SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2016, 26 (01) : 27 - 68
  • [3] Automated analysis of permission-based security using UMLsec
    Juerjens, Jan
    Schreck, Joerg
    Yu, Yijun
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2008, 4961 : 292 - 295
  • [4] Generating Permission-Based Security Policies
    Li, Xin
    Hua Vy Le Thanh
    Deng, Yuxin
    Dolby, Julian
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 1 - 7
  • [5] A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android
    Barrera, David
    Kayacik, H. Guenes
    van Oorschot, P. C.
    Somayaji, Anil
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 73 - 84
  • [6] The Design and Formalization of Mezzo, a Permission-Based Programming Language
    Balabonski, Thibaut
    Pottier, Francois
    Protzenko, Jonathan
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2016, 38 (04):
  • [7] Constraints for Permission-Based Delegations
    Shang, Qinghua
    Wang, Xingang
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 216 - +
  • [8] Towards a multilayered permission-based access control for extending Android security
    Chang, Rui
    Jiang, Liehui
    Chen, Wenzhi
    He, Hongqi
    Yang, Shuiqiao
    Jiang, Hang
    Liu, Wei
    Liu, Yong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
  • [9] Drivers and barriers of permission-based marketing
    Bhatia, Vinita
    JOURNAL OF RESEARCH IN INTERACTIVE MARKETING, 2020, 14 (01) : 51 - 70
  • [10] Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
    Jha, Ajay Kumar
    Lee, Woo Jin
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 459 - 474