Weaving authentication and authorization requirements into the functional model of a system using Z promotion

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The use of Z in software development has focused on specifying the functionality of a system. However, when developing secure system, it is important to address fundamental security aspects, such as authentication, authorization, and auditing. In this paper, we show an approach for building systems from generic and modular security components using promotion technique in Z. The approach focuses on weaving security component into the functionality of a system using promotion technique in Z. For each component, Z notation is used to construct its state-based model and the relevant operations. Once a component is introduced, the defined local operations are promoted to work on the global state. We illustrate this approach on the development of a "secure" model for a conference management system. With this approach, it is possible to specify the core functionalities of a system independently from the security mechanisms. Authentication and authorization are viewed as components which are carefully integrated with the functional system. © 2008 Springer-Verlag.

Cite

CITATION STYLE

APA

Haidar, A. N., & Abdallah, A. E. (2008). Weaving authentication and authorization requirements into the functional model of a system using Z promotion. In Communications in Computer and Information Science (Vol. 17 CCIS, pp. 831–846). Springer Verlag. https://doi.org/10.1007/978-3-540-88479-8_59

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free