Specification and validation of authorisation constraints using UML and OCL

Karsten Sohr, Gail Joon Ahn, Martin Gogolla, Lars Migge

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Scopus citations

Abstract

Authorisation constraints can help the policy architect design and express higher-level security policies for organisations such as financial institutes or governmental agencies. Although the importance of constraints has been addressed in the literature, there does not exist a systematic way to validate and test authorisation constraints. In this paper, we attempt to specify non-temporal constraints and history-based constraints in Object Constraint Language (OCL) which is a constraint specification language of Unified Modeling Language (UML) and describe how we can facilitate the USE tool to validate and test such policies. We also discuss the issues of identification of conflicting constraints and missing constraints.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages64-79
Number of pages16
DOIs
StatePublished - Dec 1 2005
Externally publishedYes
Event10th European Symposium on Research in Computer Security, ESORICS 2005 - Milan, Italy
Duration: Sep 12 2005Sep 14 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3679 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th European Symposium on Research in Computer Security, ESORICS 2005
CountryItaly
CityMilan
Period9/12/059/14/05

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Specification and validation of authorisation constraints using UML and OCL'. Together they form a unique fingerprint.

  • Cite this

    Sohr, K., Ahn, G. J., Gogolla, M., & Migge, L. (2005). Specification and validation of authorisation constraints using UML and OCL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 64-79). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3679 LNCS). https://doi.org/10.1007/11555827_5