期刊文献+

基于模型驱动的安全访问控制的研究

Research of Security Access Control Based on Model-Driven
下载PDF
导出
摘要 随着计算机应用到各个领域的广度、深度不断扩大,软件的安全需求变得越来越复杂.然而开发人员对系统进行建模时一般不考虑安全需求,系统安全策略和安全机制往往是开发人员在系统开发后期对系统的补充和措施的完善.由此提出将访问控制需求集成到软件开发过程的分析阶段,将访问控制策略建模与功能需求建模集成.通过模型驱动方法为功能需求模型相关的安全方面提供模型,研究从功能模型产生安全模型,最终形成安全访问控制策略. Along with the development of the depth and width in applying computers into all kinds of domains,the software's security requirements become more and more complicated.However,the present software system modeling does not deal with security.System security policy and mechanism often become supplement at the end of system development.This paper investigates how to integrate access control requirements into analysis phrase of the development process and how to integrate the modeling of access control policies into the UML modeling of functional requirements.Through the approach of model driven,the paper provides models for security aspects related to the models for functional requirements and investigates how the security models can be generated from the functional models.Finally security access control policies will be generated.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第8期136-139,142,共5页 Microelectronics & Computer
关键词 模型驱动 UML 访问控制策略 安全建模 model-driven UML access control policy security modeling
  • 相关文献

参考文献4

  • 1Brose G. A view--based access control model for COR- BA[C]// Security Internet Programming: Security Is- sues for Mobile and Distributed Objects. Berlin: LNCS1603, Spring, 2002:237-337.
  • 2张赛男,殷兆麟,刘厚泉.软件系统UML建模与其安全建模的集成[J].计算机工程,2007,33(8):86-88. 被引量:6
  • 3PendeT.UMI.宅典[M].北京:电子工业出版社,2004:146-152.
  • 4Brose G, Koch M, Lohr K P. Integrating access control design into the software development process [C]//Proc. of the 6th International Conference on Integrated Design and Process Technology. Trondheim, 2002.

二级参考文献4

  • 1刘润东.UML对象设计与编程[M].北京:北京希望电子出版社,2001..
  • 2Brose G; Koch M, Lohr K E Integrating Access Control Design into the Software Development Process[C]//Proc. of the 6^th International Conference on Integrated Design and Process Technology. 2002.
  • 3Koch M, Presicce F P. Access Control Policy Specification in UML[DB/OL]. 2002. www.inf.fuberlin/-mkoch/um102GG.ps.
  • 4Pende T.UML宝典[M].北京:电子工业出版社,2004.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部