Requirements-Based Access Control Analysis and Policy Specification

dc.contributor.advisorTing Yu, Committee Memberen_US
dc.contributor.advisorLaurie Williams, Committee Memberen_US
dc.contributor.advisorJulie Earp, Committee Memberen_US
dc.contributor.advisorAnnie I. Anton, Committee Chairen_US
dc.contributor.authorHe, Qingfengen_US
dc.date.accessioned2010-04-02T18:29:32Z
dc.date.available2010-04-02T18:29:32Z
dc.date.issued2005-08-15en_US
dc.degree.disciplineComputer Scienceen_US
dc.degree.leveldissertationen_US
dc.degree.namePhDen_US
dc.description.abstractAccess control is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) define how access is managed and the high-level rules of who can access what information under certain conditions. Traditionally, access control policies have been specified in an ad-hoc manner, leaving systems vulnerable to security breaches. ACP specification is often isolated from requirements analysis, resulting in policies that are not in compliance with system requirements. This dissertation introduces the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method for deriving access control policies from various sources, including software requirements specifications (SRS), software designs, and high-level security/privacy policies. The ReCAPS method is essentially an analysis method supported by a set of heuristics and a software tool: the Security and Privacy Requirements Analysis Tool (SPRAT). The method was developed in two formative case studies and validated in two summative case studies. All four case studies involved operational systems, and ReCAPS evolved as a result of the lessons learned from applying the method to these case studies. Further validation of the method was performed via an empirical study to evaluate the usefulness and effectiveness of the approach. Results from these evaluations indicate that the process and heuristics provided by the ReCAPS method are useful for specifying database-level and application-level ACPs. Additionally, ReCAPS integrates policy specification into software development, thus providing a basic framework for ensuring compliance between different levels of policies, system requirements and software design. The method also improves the quality of requirements specifications and system designs by clarifying ambiguities and resolving conflicts across these artifacts.en_US
dc.identifier.otheretd-08072005-113622en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/3378
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectpolicy specificationen_US
dc.subjectsecurity and privacyen_US
dc.subjectsoftware engineeringen_US
dc.subjectaccess control policyen_US
dc.subjectrequirements engineeringen_US
dc.titleRequirements-Based Access Control Analysis and Policy Specificationen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
3.37 MB
Format:
Adobe Portable Document Format

Collections