Title: Identifying and resolving least privilege violations in software architectures
Authors: Buyens, Koen ×
De Win, Bart
Joosen, Wouter #
Issue Date: Mar-2009
Host Document: Fourth International Conference on Availability, Security and Reliability pages:232-239
Conference: Fourth International Conference on Availability, Security and Reliability edition:4 location:Fukuoka, Japan date:16-19 March 2009
Abstract: The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a result, they are often neglected, which lowers the overall security level of the software system and increases the cost to fix this later on.
This paper improves the support for least privilege in software architectures by (i) defining the foundations to identify potential violations of the principle herein and (ii) elicitating architectural transformations that ameliorate the
security properties of the architecture. These results have been implemented and validated in three case studies.
Publication status: published
KU Leuven publication type: IC
Appears in Collections:Informatics Section
× corresponding author
# (joint) last author

Files in This Item:
File Description Status SizeFormat
paper.pdf Published 392KbAdobe PDFView/Open


All items in Lirias are protected by copyright, with all rights reserved.

© Web of science