|Book Series (78)||
|Medien- und Kommunikationswissenschaften||
|Biochemistry, molecular biology, gene technology||107|
|Domestic and nutritional science||40|
|Environmental research, ecology and landscape conservation||130|
5. Auflage bestellen
|ISBN-13 (Hard Copy)||9783736999800|
|Lamination of Cover||matt|
|Place of Dissertation||Ilmenau|
|Keywords||Information Security, Computer Security, System Security, System Design, Software Engineering, Security Engineering, Security Policy, Security Model, Security Property, Security Analysis, Access Control, Role-based Access Control, RBAC, Attribute-based Access Control, ABAC, Aspect-oriented Engineering, Non-functional Property, Formal Methods, Entity Labeling, Model-based Design, Model Engineering, Model Analysis, Model Core, Dynamic Property, Safety, Heuristic Analysis, Operating System, Middleware, Linux, SELinux|
|URL to External Homepage||https://www.tu-ilmenau.de/vsbs/|
Engineering secure systems is an error-prone process, where any decision margin potentially favors critical implementation faults. To this end, formal security models serve as an abstract basis for verifying security properties. Unfortunately, the potential for human error in engineering and analyzing such models is still considerable.
This work seeks to mitigate this problem. We identified semantic gaps between security requirements, informal security policies, and security models as a major source of error. Our goal is then based on this observation: to support error-minimizing design decisions by bridging such gaps. Due to the broad range of security-critical application domains, no single modeling framework may achieve this. We therefore adopt the idea of aspect-oriented software development to tailor the formal part of a security engineering process towards security requirements of the system.
Our method, termed aspect-oriented security engineering, is based on the idea of keeping each step in this process well-defined, small, and monotonic in terms of the degree of formalism. Our practical results focus on two use cases: first, model engineering for operating systems and middleware security policies; second, model analysis of runtime properties related to potential privilege escalation. We eventually combine both use cases to present a model-based reengineering approach for the access control system of Security-Enhanced Linux (SELinux).