Analyzing RBAC Security Policy of Implementation Using AST
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Analyzing RBAC Security Policy of Implementation Using AST
Published Date
2009
Publisher
Type
Report
Abstract
Security policy is a critical property in software applications which require high levels of safety and security. It has to be clearly specified in requirement documents and its implementation must be conformed to the specification. In this paper, we propose an approach to check if the implementation is in accordance with its security policy specification. We use the Abstract Syntax Tree (AST), another manner of expressing the program, to analyze the source code and specify user permission policy in software systems by Role-Based Access Control (RBAC).
Keywords
Description
Associated research group: Critical Systems Research Group
Related to
Replaces
License
Series/Report Number
Funding information
Isbn identifier
Doi identifier
Previously Published Citation
Proceedings of the 2009 International Conference on Knowledge and Systems Engineering (KSE '09)
Other identifiers
Suggested citation
Pham, Hung T.; Truong, Ninh-Thuan; Nguyen, Viet-Ha. (2009). Analyzing RBAC Security Policy of Implementation Using AST. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/217425.
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.