Tool support for enforcing security policies on databases

Jenny Abramov, Omer Anson, Arnon Sturm, Peretz Shoval

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security requirements should be considered from the early stages of the development process. However, such requirements tend to be neglected or dealt-with only at the end of the development process. The Security Modeling Tool presented in this paper aims at guiding and enforcing developers, in particular database designers, to deal with database authorization requirements from the early stages of the development process. In this paper we demonstrate how the Security Modeling Tool assists the various stakeholders in designing secure database code and describe the tool architecture.

Original languageEnglish
Title of host publicationInformation Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers
EditorsS. Nurcan
PublisherSpringer Verlag
Pages126-141
Number of pages16
Volume107
ISBN (Print)9783642297489
DOIs
StatePublished - 1 Jan 2012
EventCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World - London, United Kingdom
Duration: 20 Jun 201124 Jun 2011

Publication series

NameLecture Notes in Business Information Processing
Volume107 LNBIP
ISSN (Print)1865-1348

Conference

ConferenceCAiSE Forum 2011 on IS Olympics: Information Systems in a Diverse World
Country/TerritoryUnited Kingdom
CityLondon
Period20/06/1124/06/11

Keywords

  • Secure software engineering
  • authorization
  • database design

ASJC Scopus subject areas

  • Management Information Systems
  • Control and Systems Engineering
  • Business and International Management
  • Information Systems
  • Modeling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Tool support for enforcing security policies on databases'. Together they form a unique fingerprint.

Cite this