Analysis, comparison and design of role-based security specifications
作者:
Highlights:
•
摘要
The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security components.
论文关键词:Authorization design,Role-based models,Security specifications,Similarity techniques
论文评审过程:Received 10 January 1996, Revised 1 April 1996, Accepted 1 April 1996, Available online 19 May 1998.
论文官网地址:https://doi.org/10.1016/S0169-023X(96)00025-0