Logo des Repositoriums
 

Generating monitors for usage control

dc.contributor.authorDeckwerth, Frederik
dc.contributor.editorWagner, Stefan
dc.contributor.editorLichter, Horst
dc.date.accessioned2018-10-24T10:00:35Z
dc.date.available2018-10-24T10:00:35Z
dc.date.issued2013
dc.description.abstractProtecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a model driven approach to solve this problem based on graph transformation. Using the precise semantics of graph transformation, access control models and policies can be formally analyzed in an early phase. The existing solutions on automated verification and efficient implementation of graph transformation show that this approach is suitable to address security concerns throughout the overall software development process.en
dc.identifier.isbn978-3-88579-609-1
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/17411
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSoftware Engineering 2013 - Workshopband
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-215
dc.titleGenerating monitors for usage controlen
dc.typeText/Conference Paper
gi.citation.endPage582
gi.citation.publisherPlaceBonn
gi.citation.startPage577
gi.conference.date26. Februar-1. März 2013
gi.conference.locationAachen
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
577.pdf
Größe:
77.5 KB
Format:
Adobe Portable Document Format