Specification and validation of authorisation constraints using UML and OCL

Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Abstract

Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and history-based constraints in Object Constraint Language (OCL) which is a constraint specification language of Unified Modeling Language (UML) and describe how we can facilitate the USE tool to validate and test such policies. We also discuss the issues of identification of conflicting constraints and missing constraints.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages64-79
Number of pages16
Volume3679 LNCS
DOIs
StatePublished - 2005
Externally publishedYes
Event10th European Symposium on Research in Computer Security, ESORICS 2005 - Milan, Italy
Duration: Sep 12 2005Sep 14 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3679 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th European Symposium on Research in Computer Security, ESORICS 2005
CountryItaly
CityMilan
Period9/12/059/14/05

Fingerprint

Unified Modeling Language
Specification languages
Authorization
Language
Specification
Specifications
History
Organizations
Object
Security Policy
Specification Languages
Express

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Sohr, K., Ahn, G-J., Gogolla, M., & Migge, L. (2005). Specification and validation of authorisation constraints using UML and OCL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3679 LNCS, pp. 64-79). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3679 LNCS). https://doi.org/10.1007/11555827_5

Specification and validation of authorisation constraints using UML and OCL. / Sohr, Karsten; Ahn, Gail-Joon; Gogolla, Martin; Migge, Lars.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3679 LNCS 2005. p. 64-79 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3679 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sohr, K, Ahn, G-J, Gogolla, M & Migge, L 2005, Specification and validation of authorisation constraints using UML and OCL. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3679 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3679 LNCS, pp. 64-79, 10th European Symposium on Research in Computer Security, ESORICS 2005, Milan, Italy, 9/12/05. https://doi.org/10.1007/11555827_5
Sohr K, Ahn G-J, Gogolla M, Migge L. Specification and validation of authorisation constraints using UML and OCL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3679 LNCS. 2005. p. 64-79. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11555827_5
Sohr, Karsten ; Ahn, Gail-Joon ; Gogolla, Martin ; Migge, Lars. / Specification and validation of authorisation constraints using UML and OCL. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3679 LNCS 2005. pp. 64-79 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{43e8c72b1234474d8c28a0a72cdf9d0e,
title = "Specification and validation of authorisation constraints using UML and OCL",
abstract = "Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and history-based constraints in Object Constraint Language (OCL) which is a constraint specification language of Unified Modeling Language (UML) and describe how we can facilitate the USE tool to validate and test such policies. We also discuss the issues of identification of conflicting constraints and missing constraints.",
author = "Karsten Sohr and Gail-Joon Ahn and Martin Gogolla and Lars Migge",
year = "2005",
doi = "10.1007/11555827_5",
language = "English (US)",
isbn = "3540289631",
volume = "3679 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "64--79",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Specification and validation of authorisation constraints using UML and OCL

AU - Sohr, Karsten

AU - Ahn, Gail-Joon

AU - Gogolla, Martin

AU - Migge, Lars

PY - 2005

Y1 - 2005

N2 - Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and history-based constraints in Object Constraint Language (OCL) which is a constraint specification language of Unified Modeling Language (UML) and describe how we can facilitate the USE tool to validate and test such policies. We also discuss the issues of identification of conflicting constraints and missing constraints.

AB - Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and history-based constraints in Object Constraint Language (OCL) which is a constraint specification language of Unified Modeling Language (UML) and describe how we can facilitate the USE tool to validate and test such policies. We also discuss the issues of identification of conflicting constraints and missing constraints.

UR - http://www.scopus.com/inward/record.url?scp=33646027053&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33646027053&partnerID=8YFLogxK

U2 - 10.1007/11555827_5

DO - 10.1007/11555827_5

M3 - Conference contribution

AN - SCOPUS:33646027053

SN - 3540289631

SN - 9783540289630

VL - 3679 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 64

EP - 79

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -