Title: Identifying and resolving least privilege violations in software architectures
Authors: Buyens, Koen
De Win, Bart
Joosen, Wouter
Issue Date: Dec-2008
Publisher: Department of Computer Science, K.U.Leuven
Series Title: CW Reports vol:CW532
Abstract: Security principles, like least privilege, are among the resources in the security body of knowledge that survived the test of time. The implementation of these principles in a software architecture is difficult, as there are no systematic rules on how to apply them in practice. As a result, they are often neglected, which lowers the overall security level of the software system and increases the cost necessary to fix this later in de development life-cycle.

This report improves the support for least privilege in software architectures by (i) defining the foundations to identify potential violations of the principle herein and (ii) elicitating architectural transformations that positively impact the security properties of the architecture, while preserving the semantics thereof. These results have been implemented and validated in a number of case studies.
Publication status: published
KU Leuven publication type: IR
Appears in Collections:Informatics Section

Files in This Item:
File Description Status SizeFormat
CW532.pdfDocument Published 1688KbAdobe PDFView/Open


All items in Lirias are protected by copyright, with all rights reserved.