1. Model-based Analysis of Java EE Web Security Configurations
- Author
-
Salvador Martínez, Valerio Cosentino, Jordi Cabot, IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Laboratoire d'Informatique de Nantes Atlantique (LINA), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS), Modeling Technologies for Software Production, Operation, and Evolution (ATLANMOD), Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Département informatique - EMN, Mines Nantes (Mines Nantes)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN), and Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Centre National de la Recherche Scientifique (CNRS)-Mines Nantes (Mines Nantes)-Université de Nantes (UN)-Département informatique - EMN
- Subjects
Cloud computing security ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Reverse-engineering ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Computer security model ,Computer security ,computer.software_genre ,Web application security ,Security testing ,Security information and event management ,Security service ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Security through obscurity ,Security ,Network security policy ,business ,computer ,Access-control - Abstract
International audience; The widespread use of Java EE web applications as a means to provide distributed services to remote clients imposes strong security requirements, so that the resources managed by these applications remain protected from unauthorized disclosures and manipulations. For this purpose, the Java EE framework provides developers with mechanisms to define access-control policies. Unfortunately , the variety and complexity of the provided security configuration mechanisms cause the definition and manipulation of a security policy to be complex and error prone. As security requirements are not static, and thus, implemented policies must be changed and reviewed often, discovering and representing the policy at an appropriate abstraction level to enable their understanding and reenginering appears as a critical requirement. To tackle this problem, this paper presents a (model-based) approach aimed to help security experts to visualize, (automatically) analyse and manipulate web security policies.
- Published
- 2016
- Full Text
- View/download PDF