The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security components.
Analysis, Comparison and Design of Role-Based Security Specifications / S. Castano, G. Martella, P. Samarati. - In: DATA & KNOWLEDGE ENGINEERING. - ISSN 0169-023X. - 21:1(1996 Dec), pp. 31-55. [10.1016/S0169-023X(96)00025-0]
Analysis, Comparison and Design of Role-Based Security Specifications
S. CastanoPrimo
;G. MartellaSecondo
;P. SamaratiUltimo
1996
Abstract
The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security components.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.