Automated reverse engineering of role-based access control policies of web applications.
Ha Thanh LeLwin Khin SharDomenico BianculliLionel Claude BriandCu Duy NguyenPublished in: J. Syst. Softw. (2022)
Keyphrases
- web applications
- reverse engineering
- access control policies
- access control
- conflict resolution
- access control systems
- legacy systems
- security policies
- software engineering
- distributed environment
- trust negotiation
- application development
- fine grained
- legacy software systems
- end users
- software maintenance
- object oriented
- program understanding
- business rules
- web services
- security mechanisms
- role based access control
- access control models
- access rights
- database
- security requirements
- business processes
- distributed systems
- artificial intelligence
- databases