• DocumentCode
    782271
  • Title

    An approach for modeling and analysis of security system architectures

  • Author

    Deng, Yi ; Wang, Jiacun ; Tsai, Jeffrey J P ; Beznosov, Konstantin

  • Author_Institution
    Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA
  • Volume
    15
  • Issue
    5
  • fYear
    2003
  • Firstpage
    1099
  • Lastpage
    1119
  • Abstract
    Security system architecture governs the composition of components in security systems and interactions between them. It plays a central role in the design of software security systems that ensure secure access to distributed resources in networked environment. In particular, the composition of the systems must consistently assure security policies that it is supposed to enforce. However, there is currently no rigorous and systematic way to predict and assure such critical properties in security system design. A systematic approach is introduced to address the problem. We present a methodology for modeling security system architecture and for verifying whether required security constraints are assured by the composition of the components. We introduce the concept of security constraint patterns, which formally specify the generic form of security policies that all implementations of the system architecture must enforce. The analysis of the architecture is driven by the propagation of the global security constraints onto the components in an incremental process. We show that our methodology is both flexible and scalable. It is argued that such a methodology not only ensures the integrity of critical early design decisions, but also provides a framework to guide correct implementations of the design. We demonstrate the methodology through a case study in which we model and analyze the architecture of the Resource Access Decision (RAD) Facility, an OMG standard for application-level authorization service.
  • Keywords
    authorisation; distributed processing; formal verification; OMG standard; Petri nets; Resource Access Decision Facility; access control; application-level authorization service; case study; constraint patterns; distributed resources; formal architectural modeling; formal verification; global security constraints; incremental process; networked environment; secure access; security constraint patterns; security policies; security system architectures; security system design; system architecture; systematic approach; temporal logic; Access control; Application software; Authorization; Computer architecture; Data security; Formal verification; Information security; Logic design; Software design; Software systems;
  • fLanguage
    English
  • Journal_Title
    Knowledge and Data Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1041-4347
  • Type

    jour

  • DOI
    10.1109/TKDE.2003.1232267
  • Filename
    1232267