Security@Runtime: A flexible MDE approach to enforce fine-grained security policies

Yehia Elrakaiby, Moussa Amrani, Yves Le Traon

Résultats de recherche: Contribution dans un livre/un catalogue/un rapport/dans les actes d'une conférenceArticle dans les actes d'une conférence/un colloque

Résumé

In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific modeling Language (Dsl), called Security@Runtime, for the specification of security configurations of targeted systems. The Security@Runtime Dsl supports the expression of authorization, obligation and reaction policies, covering many of the security requirements of modern applications. Security requirements specified in security configurations are enforced using an application-independent Policy Enforcement Point Pep)-Policy Decision Point (Pdp) architecture, which enables the runtime update of security requirements. Our work is evaluated using two systems and its advantages and limitations are discussed.

langue originaleAnglais
titreEngineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Proceedings
EditeurSpringer Verlag
Pages19-34
Nombre de pages16
ISBN (imprimé)9783319048963
Les DOIs
Etat de la publicationPublié - 2014
Modification externeOui
Evénement6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014 - Munich, Allemagne
Durée: 26 févr. 201428 févr. 2014

Série de publications

NomLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8364 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférence6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014
Pays/TerritoireAllemagne
La villeMunich
période26/02/1428/02/14

Empreinte digitale

Examiner les sujets de recherche de « Security@Runtime: A flexible MDE approach to enforce fine-grained security policies ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation