Skip to main content

Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (KAR id:42968)


Self-adaptive access control, in which self-* properties are applied to protecting systems, is a promising solution for the handling of malicious user behaviour in complex infrastructures.

The contribution of this paper is the generation, transformation and verification of Role Based Access Control (RBAC) models at run-time, as a means for providing assurances that the adaptations to be deployed are valid.

Depending on the type of attack, and based on the models from the target system and its environment, the adapted access control models need to be evaluated against the RBAC metamodel, and the adaptation constraints related to the application.

The feasibility of the proposed approach has been demonstrated in the context of a fully working prototype using malicious scenarios inspired by a well documented case of insider attack.

Item Type: Conference or workshop item (Paper)
Uncontrolled keywords: adaptive security, model verification, rbac, self-adaptation
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Faculties > University wide - Teaching/Research Groups > Centre for Cyber Security Research
Faculties > Sciences > School of Computing
Depositing User: Rogerio de Lemos
Date Deposited: 16 Sep 2014 23:13 UTC
Last Modified: 29 May 2019 13:05 UTC
Resource URI: (The current URI for this page, for reference purposes)
de Lemos, Rogerio:
  • Depositors only (login required):


Downloads per month over past year