Analyzing RBAC Security Policy of Implementation Using AST

Loading...
Thumbnail Image

View/Download File

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Analyzing RBAC Security Policy of Implementation Using AST

Published Date

2009

Publisher

Type

Report

Abstract

Security policy is a critical property in software applications which require high levels of safety and security. It has to be clearly specified in requirement documents and its implementation must be conformed to the specification. In this paper, we propose an approach to check if the implementation is in accordance with its security policy specification. We use the Abstract Syntax Tree (AST), another manner of expressing the program, to analyze the source code and specify user permission policy in software systems by Role-Based Access Control (RBAC).

Keywords

Description

Associated research group: Critical Systems Research Group

Related to

Replaces

License

Series/Report Number

Funding information

Isbn identifier

Doi identifier

Previously Published Citation

Proceedings of the 2009 International Conference on Knowledge and Systems Engineering (KSE '09)

Suggested citation

Pham, Hung T.; Truong, Ninh-Thuan; Nguyen, Viet-Ha. (2009). Analyzing RBAC Security Policy of Implementation Using AST. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/217425.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.