Title :
Role Engineering with SKAOS for Systems Employing RBAC
Author :
Huang, Chao ; Sun, Jianling ; Wang, Xinyu ; Si, Yuanjie
Author_Institution :
Dept. of Comput. Sci., Zhejiang Univ., Hangzhou
Abstract :
Access control is always essential for safe and security access to the system resource. Role based access control (RBAC) model is widely used in large enterprise software systems. The quality of the RBAC policy design especially role definition has great impact on the system security policy implementation. In this paper we propose a novel role engineering methods with security KAOS (SKAOS), which guide the engineering process via keeping decomposing the functional requirement objective and combining the system security requirement. SKAOS not only simplifies the system userpsilas involvement in the role engineering process via supplying with the objective decomposition but also reduces the complexity of the operation analysis. After building the objective decomposition and activity analysis diagrams, the role definition can be delivered. We illustrate the effectiveness of our method via analyzing a real world requirement problem.
Keywords :
authorisation; formal specification; formal verification; software metrics; systems analysis; RBAC policy design; SKAOS; activity analysis diagram; functional requirements decomposition; goal oriented requirements engineering; large enterprise software system security policy; role based access control model; role engineering method; security KAOS; Access control; Chaos; Computer science; Data engineering; Data security; Electronic mail; Information analysis; Information security; Permission; Sun; RBAC; SKAOS; role engineering; security requirement;
Conference_Titel :
Networking and Digital Society, 2009. ICNDS '09. International Conference on
Conference_Location :
Guiyang, Guizhou
Print_ISBN :
978-0-7695-3635-4
DOI :
10.1109/ICNDS.2009.94