Automated checking of SAP security permisisons

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

Configuring user security permissions in standard business applications (such as SAP systems) is difficult and error-prone. There are many examples of wrongly configured systems that are open to misuse by unauthorized parties. To check permission files of a realistic size in a medium to large organization manually can be a daunting task which is often neglected. We present research on construction of a tool which automatically checks the SAP configuration for security policy rules (such as separation of duty). The tool uses advanced methods of automated software engineering: The permissions are given as input in an XML format through an interface from the SAP system, the business application is described ba a diagram modeled with standard UML CASE (Computer-Aided Software Engineering) - tools and output as XMI, and our tool checks the permissions against the rules using an analyzer written in Prolog. Because of its modular architecture and its standardized interfaces, the tool can be easily adapted to check security constraints in other kinds of application software (such as firewall or other access control configurations). © 2004 Kluwer Academic Publishers.

Cite

CITATION STYLE

APA

Höhn, S., & Jürjens, J. (2004). Automated checking of SAP security permisisons. In IFIP Advances in Information and Communication Technology (Vol. 140, pp. 13–30). Springer New York LLC. https://doi.org/10.1007/1-4020-7901-x_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free