IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH
Zaobin Gan, Dengwei Wei, Vijay Varadharajan
2006
Abstract
It has been recognized that the main source of problems with application software security is in most cases that the software is poorly designed and developed with respect to authentication and authorization. Aiming at preventing the security issues in the course of software design and development, this paper presents a framework for integrating a security policy specification with a system function integration. On the basis of the Role-Based Access Control (RBAC) model, this framework moves the responsibility of security through a central authorization management mechanism, Single Sign-On (SSO) access and integration management of security resources. The design can integrate the enterprise’s multiple new, developing and existing application systems, and provide end users access these systems as a single system. An application instance of the framework is given in a large-sized enterprise information integrated system as well. The results show that the framework may provide enterprises with uniform and robust enforcement policies to improve the security of sensitive information systems.
References
- Apfrlbeck, J. (2001). A role based modelling approach for the information infrastructure. In Proceedings of the IEEE International Conference on Communications, pages 1617-1621. IEEE CS Press.
- Ferraiolo, D. and Kuhn, D. R. (1992). Role based access control. In Proceedings of the 15th Annual Conference on National Computer Security, pages 554-563, Piscataway, NJ, USA. IEEE Press.
- Gan, Z. B. (2002). The technical report for xiaolangdi power station information integrated system. Technical report, Huazhong University of Science and Technology.
- Harmantzis, F. and Malek, M. (2004). Security risk analysis and evaluation. In Proceedings of the 2004 IEEE International Conference on Communications, pages 1897-1901, Piscataway, NJ, USA. IEEE Press.
- Hitchens, M. and Varadharajan, V. (2000). Design and specification of role-based access control policies. In IEE Proceddings Software, pages 117-129, Piscataway, NJ, USA. IEEE Press.
- Jajodia, S., Smarati, P., and Subrahmanian, V. (1997). A logical language for expressing authorizations. In Proceedings of the IEEE Symposium on Security and Privacy, pages 31-42, Piscataway, NJ, USA. IEEE Press.
- Lindqvist, U. and Jonsson, E. (1998). A map of security risks associated with using cots. Computer, 31(6):60- 66.
- McGraw, G. (2002). Managing software security risks. Computer, 35(4):99-101.
- Sandhu, R. and Coyne, E. (Feb. 1996). Role-based access control models. Computer, pages 38-47.
- Sandhu, R., Coyne, E., and et al., H. F. (1994). Role-based access control: A multi-dimensional view. In Proceeding of the 10th Annual Computer Security Applications Conference, pages 54-61, Orlando, FL, USA. IEEE CS Press.
- Sandhu, R. and Feinstein, H. (1994). A three tier architecture for role-based access control. In Proceedings of the 17th national computer security conference, pages 34-46. IEEE CS Press.
- Sandhu, R. S. and Samarati, P. (1994). Access control: principle and practice. IEEE Comm., pages 40-48.
- Simon, R. and Zurko, M. (1997). Separation of duty in role-based environments. In Proceedings of the 10th Computer Security Foundations Workshop, pages 183-194, Piscataway, NJ, USA. IEEE Press.
- Thomsen, D., O'Brien, D., and Bogle, J. (1998). Role based access control framework for network enterprises. In Proceedings of the 14th Annual Computer Security Applications Conference, pages 50-58, Phoenix, Arizona. IEEE CS Press.
Paper Citation
in Harvard Style
Gan Z., Wei D. and Varadharajan V. (2006). IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 437-442. DOI: 10.5220/0002096004370442
in Bibtex Style
@conference{secrypt06,
author={Zaobin Gan and Dengwei Wei and Vijay Varadharajan},
title={IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={437-442},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002096004370442},
isbn={978-972-8865-63-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH
SN - 978-972-8865-63-4
AU - Gan Z.
AU - Wei D.
AU - Varadharajan V.
PY - 2006
SP - 437
EP - 442
DO - 10.5220/0002096004370442