A Rigorous Approach to Uncovering Security Policy Violations in UML Designs.
Lijun YuRobert B. FranceIndrakshi RaySudipto GhoshPublished in: ICECCS (2009)
Keyphrases
- security policies
- model based testing
- access control
- network security
- distributed systems
- security management
- security requirements
- network management
- security concerns
- metamodel
- access control systems
- event logs
- access control policies
- software engineering
- software systems
- database design
- software architecture
- modeling language
- home network
- object oriented
- intrusion detection
- ubiquitous computing environments
- sequence diagrams
- unauthorized access
- software development
- uml class diagrams
- access control mechanism
- design principles