The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security components.

Analysis, Comparison and Design of Role-Based Security Specifications / S. Castano, G. Martella, P. Samarati. - In: DATA & KNOWLEDGE ENGINEERING. - ISSN 0169-023X. - 21:1(1996 Dec), pp. 31-55. [10.1016/S0169-023X(96)00025-0]

Analysis, Comparison and Design of Role-Based Security Specifications

S. Castano
Primo
;
G. Martella
Secondo
;
P. Samarati
Ultimo
1996

Abstract

The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security components.
Authorization design; Role-based models; Security specifications; Similarity techniques
Settore INF/01 - Informatica
dic-1996
Article (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/180073
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact