Context-based Access Control and Attack Modelling and Analysis
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include met...
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
KIT Scientific Publishing
2024
|
| Series: | The Karlsruhe Series on Software Design and Quality |
| Subjects: | |
| ISBN: | 3731513625, 9783731513629 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development. |
|---|---|
| AbstractList | This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development. |
| Author | Walter, Maximilian |
| Author_xml | – sequence: 1 fullname: Walter, Maximilian |
| BookMark | eNpNj0tPwzAQhC0BErT0yolD_kDo-hnnAFJV8RJFIAFnax07ldVgV3EO9N-TKhw47egbzWhnRk5jip6QKwo3Ugi5fPl4X1IAoBUwJU_IjFecSsoVk-dkkXOwILXSijF1Qe7WKQ7-ZygtZu-KVdP4nIsj7FNXYBzRMGCzK16T810X4naCEbtDDvmSnLXYZb_4u3Py9XD_uX4qN2-Pz-vVpkRdc1Xy1lmNTnOpGB8VatE4YWslmbDSAngOQlTt-JNT0ivuq5Y3QlJNFWpm-ZzcTr0J9z6afR--sT-YhMF0wfaTPjqp3xoGRgIYOq6vTM2A12P--n_eJbQp7bKhAqjU_Bc141yZ |
| ContentType | eBook |
| DBID | V1H A7I |
| DOI | 10.5445/KSP/1000170265 |
| DatabaseName | DOAB: Directory of Open Access Books OAPEN |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: V1H name: DOAB: Directory of Open Access Books url: https://directory.doabooks.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | oai_library_oapen_org_20_500_12657_92039 140158 |
| GroupedDBID | A7I AAERH AGBLZ ALMA_UNASSIGNED_HOLDINGS V1H |
| ID | FETCH-LOGICAL-a8936-3fdb8ad835623b8aa84cd4b96524b5b00e30447f622d65e63e7f3c451816a82b3 |
| IEDL.DBID | V1H |
| ISBN | 3731513625 9783731513629 |
| IngestDate | Mon Dec 01 21:33:08 EST 2025 Tue Nov 04 05:39:49 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a8936-3fdb8ad835623b8aa84cd4b96524b5b00e30447f622d65e63e7f3c451816a82b3 |
| OpenAccessLink | https://directory.doabooks.org/handle/20.500.12854/140158 |
| PageCount | 350 |
| ParticipantIDs | oapen_primary_oai_library_oapen_org_20_500_12657_92039 oapen_doabooks_140158 |
| PublicationCentury | 2000 |
| PublicationDate | 2024 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 2024 |
| PublicationDecade | 2020 |
| PublicationSeriesTitle | The Karlsruhe Series on Software Design and Quality |
| PublicationYear | 2024 |
| Publisher | KIT Scientific Publishing |
| Publisher_xml | – name: KIT Scientific Publishing |
| SSID | ssib058686226 |
| Score | 2.3834183 |
| Snippet | This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control... |
| SourceID | oapen |
| SourceType | Publisher |
| SubjectTerms | Angreifermodelle attacker models Computer science Computing and Information Technology Mathematical theory of computation Maths for computer scientists security Sicherheit Software architecture Softwarearchitektur |
| Title | Context-based Access Control and Attack Modelling and Analysis |
| URI | https://directory.doabooks.org/handle/20.500.12854/140158 https://library.oapen.org/handle/20.500.12657/92039 |
| Volume | 41 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07a8MwEBZt0qFT-khp-ggeurqx9dZSCKEhpRACfZBNyLIEpWCHxO3v78lKSpZO3WQZhPwh6b6T775D6E4qYXMvfCqN5ylV2KbG5i7FRnBLnPG0KNtiE2I-l8ulWuyV-ooHeR2immsTeOam_Z0fJQfAU79nWVBEkIyOgmvA5CHqgovDQzTXez7bLSUmQ-YD5iGbQxCwanBOs6i38_usooZjUKMZPb8sRnkUk8HBznRrs3LVnqWZ9v4xxxPUdSF14RQduOoM9XYFG5Lt_j1HD60WFbi6wXaVybgtlphMYrR6AgMn46Yx9jMJFdJase7YuRUu6aO36ePrZJZuCyikBmgIT4kvC2lKIFlAcqBlJLUlLRRnmBYMNpwjGaXCA1IlZ44TJzyxlIHV50biglygTlVX7hIl4GaCYwRcsASjzr2R0hWFYgr7LIcmHqB-C5neQaLjpw8Qj_2rKJ6hg5z19oJKxzeAncaZBtB0DuALrXBG1NUfA16jYwxTiLcgN6jTrL_cLTqy383HZj0Eaiyehu1S-AEkh7BW |
| linkProvider | Open Access Publishing in European Networks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Context-based+Access+Control+and+Attack+Modelling+and+Analysis&rft.au=Walter%2C+Maximilian&rft.series=The+Karlsruhe+Series+on+Software+Design+and+Quality&rft.date=2024-01-01&rft.pub=KIT+Scientific+Publishing&rft.isbn=9783731513629&rft_id=info:doi/10.5445%2FKSP%2F1000170265&rft.externalDBID=V1H&rft.externalDocID=140158 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783731513629/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783731513629/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783731513629/sc.gif&client=summon&freeimage=true |

