DocumentCode
1922132
Title
Identifying and Resolving Least Privilege Violations in Software Architectures
Author
Buyens, Koen ; Win, Bart De ; Joosen, Wouter
Author_Institution
IBBT-Distrinet Katholieke Univ. Leuven, Leuven
fYear
2009
fDate
16-19 March 2009
Firstpage
232
Lastpage
239
Abstract
Security principles, like least privilege, are among the resources in the security body of knowledge that survived the test of time. The implementation of these principles in a software architecture is difficult, as there are no systematic rules on how to apply them in practice. As a result, they are often neglected, which lowers the overall security level of the software system and increases the cost necessary to fix this later in the development life-cycle. This paper improves the support for least privilege in software architectures by (i) defining the foundations to identify potential violations of the principle herein and (ii) elicitating architectural transformations that positively impact the security properties of the architecture, while preserving the semantics thereof. These results have been implemented and validated in a number of case studies.
Keywords
security of data; software architecture; least privilege violation; software architecture; software system; Availability; Computer architecture; Costs; Permission; Programming; Security; Software algorithms; Software architecture; Software systems; Software testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location
Fukuoka
Print_ISBN
978-1-4244-3572-2
Electronic_ISBN
978-0-7695-3564-7
Type
conf
DOI
10.1109/ARES.2009.48
Filename
5066478
Link To Document