Representing access control policies in use cases

المؤلف

al-Ghathbar, Khalid

المصدر

The International Arab Journal of Information Technology

العدد

المجلد 9، العدد 3 (31 مايو/أيار 2012)، ص ص. 268-275، 8ص.

الناشر

جامعة الزرقاء

تاريخ النشر

2012-05-31

دولة النشر

الأردن

عدد الصفحات

8

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

الملخص EN

Security requirements of a software product need to receive attention throughout its development lifecycle.

This paper proposes the required notation and format to represent security requirements, especially access control policies in use case diagram and use case description.

Such enhancements offer simple representation for positive and negative authorization, grouping sensitive use cases that form a critical business task, separation of duties–both static and dynamic, least privilege, inheritance of authorizations, and security state or label for data inputted, stored or outputted.

Validating information flow requirements at an early stage prevents costly fixes that are mandated during later stages of the development life cycle.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Ghathbar, Khalid. 2012. Representing access control policies in use cases. The International Arab Journal of Information Technology،Vol. 9, no. 3, pp.268-275.
https://search.emarefa.net/detail/BIM-305268

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Ghathbar, Khalid. Representing access control policies in use cases. The International Arab Journal of Information Technology Vol. 9, no. 3 (May. 2012), pp.268-275.
https://search.emarefa.net/detail/BIM-305268

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Ghathbar, Khalid. Representing access control policies in use cases. The International Arab Journal of Information Technology. 2012. Vol. 9, no. 3, pp.268-275.
https://search.emarefa.net/detail/BIM-305268

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references : p. 274-275

رقم السجل

BIM-305268