Investigation of Access Control Models with Formal Concept Analysis: A Case Study
Web applications manage increasingly large amounts of sensitive information and often need to implement access control (AC) models. However, documentation about the implemented AC model is often sparse and few, if no tool exists to support AC model investigation. Based on the results of a previous s...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 402 |
---|---|
container_issue | |
container_start_page | 397 |
container_title | |
container_volume | |
creator | Gauthier, F. Merlo, E. |
description | Web applications manage increasingly large amounts of sensitive information and often need to implement access control (AC) models. However, documentation about the implemented AC model is often sparse and few, if no tool exists to support AC model investigation. Based on the results of a previous study, we show how formal concept analysis (FCA) can support the understanding and visualization of reverse-engineered AC models. Results of applying FCA to Moodle, a medium-sized (625 473 LOC) Web application, are presented and discussed. We show how FCA enhances the overall comprehension of reverse-engineered AC models and sheds light on previously unknown features of Moodle's AC model. |
doi_str_mv | 10.1109/CSMR.2012.50 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6178886</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6178886</ieee_id><sourcerecordid>6178886</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-52f16dc1d5aee173dbfc21650d8fc2291c1db85cc425987af31bca4dd05ddc343</originalsourceid><addsrcrecordid>eNotzMlOwzAUhWEzSZTSHTs2foGUez2HXRRRqNQKQWFdubYDRmlSxQbUt2dcnV_6pEPIBcIUEcqrerV8nDJANpVwQCalNqBVKYVSSh-SEVMCCi21OPo1FEpzKI0Qx2SEkotCcomn5CylNwAGAmFEHubdR0g5vtgc-472Da2cCynRuu_y0Ld02fvQJvoZ8yud9cPWtj_kwi7TqrPtPsV0TSta2xToKr_7_Tk5aWybwuR_x-R5dvNU3xWL-9t5XS2KiFrmQrIGlXfopQ0BNfebxjFUErz5DlbiN22MdE4wWRptG44bZ4X3IL13XPAxufz7jSGE9W6IWzvs1wq1MUbxL9wCU3Q</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Investigation of Access Control Models with Formal Concept Analysis: A Case Study</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Gauthier, F. ; Merlo, E.</creator><creatorcontrib>Gauthier, F. ; Merlo, E.</creatorcontrib><description>Web applications manage increasingly large amounts of sensitive information and often need to implement access control (AC) models. However, documentation about the implemented AC model is often sparse and few, if no tool exists to support AC model investigation. Based on the results of a previous study, we show how formal concept analysis (FCA) can support the understanding and visualization of reverse-engineered AC models. Results of applying FCA to Moodle, a medium-sized (625 473 LOC) Web application, are presented and discussed. We show how FCA enhances the overall comprehension of reverse-engineered AC models and sheds light on previously unknown features of Moodle's AC model.</description><identifier>ISSN: 1534-5351</identifier><identifier>ISBN: 9781467309844</identifier><identifier>ISBN: 1467309842</identifier><identifier>EISSN: 2640-7574</identifier><identifier>EISBN: 9780769546667</identifier><identifier>EISBN: 0769546668</identifier><identifier>DOI: 10.1109/CSMR.2012.50</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; access control models ; Analytical models ; Automata ; Context ; Documentation ; formal concept analysis ; Lattices ; Mathematical model ; reverse-engineering ; web applications</subject><ispartof>2012 16th European Conference on Software Maintenance and Reengineering, 2012, p.397-402</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6178886$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27930,54925</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6178886$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gauthier, F.</creatorcontrib><creatorcontrib>Merlo, E.</creatorcontrib><title>Investigation of Access Control Models with Formal Concept Analysis: A Case Study</title><title>2012 16th European Conference on Software Maintenance and Reengineering</title><addtitle>csmr</addtitle><description>Web applications manage increasingly large amounts of sensitive information and often need to implement access control (AC) models. However, documentation about the implemented AC model is often sparse and few, if no tool exists to support AC model investigation. Based on the results of a previous study, we show how formal concept analysis (FCA) can support the understanding and visualization of reverse-engineered AC models. Results of applying FCA to Moodle, a medium-sized (625 473 LOC) Web application, are presented and discussed. We show how FCA enhances the overall comprehension of reverse-engineered AC models and sheds light on previously unknown features of Moodle's AC model.</description><subject>Access control</subject><subject>access control models</subject><subject>Analytical models</subject><subject>Automata</subject><subject>Context</subject><subject>Documentation</subject><subject>formal concept analysis</subject><subject>Lattices</subject><subject>Mathematical model</subject><subject>reverse-engineering</subject><subject>web applications</subject><issn>1534-5351</issn><issn>2640-7574</issn><isbn>9781467309844</isbn><isbn>1467309842</isbn><isbn>9780769546667</isbn><isbn>0769546668</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotzMlOwzAUhWEzSZTSHTs2foGUez2HXRRRqNQKQWFdubYDRmlSxQbUt2dcnV_6pEPIBcIUEcqrerV8nDJANpVwQCalNqBVKYVSSh-SEVMCCi21OPo1FEpzKI0Qx2SEkotCcomn5CylNwAGAmFEHubdR0g5vtgc-472Da2cCynRuu_y0Ld02fvQJvoZ8yud9cPWtj_kwi7TqrPtPsV0TSta2xToKr_7_Tk5aWybwuR_x-R5dvNU3xWL-9t5XS2KiFrmQrIGlXfopQ0BNfebxjFUErz5DlbiN22MdE4wWRptG44bZ4X3IL13XPAxufz7jSGE9W6IWzvs1wq1MUbxL9wCU3Q</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Gauthier, F.</creator><creator>Merlo, E.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201203</creationdate><title>Investigation of Access Control Models with Formal Concept Analysis: A Case Study</title><author>Gauthier, F. ; Merlo, E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-52f16dc1d5aee173dbfc21650d8fc2291c1db85cc425987af31bca4dd05ddc343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Access control</topic><topic>access control models</topic><topic>Analytical models</topic><topic>Automata</topic><topic>Context</topic><topic>Documentation</topic><topic>formal concept analysis</topic><topic>Lattices</topic><topic>Mathematical model</topic><topic>reverse-engineering</topic><topic>web applications</topic><toplevel>online_resources</toplevel><creatorcontrib>Gauthier, F.</creatorcontrib><creatorcontrib>Merlo, E.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gauthier, F.</au><au>Merlo, E.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Investigation of Access Control Models with Formal Concept Analysis: A Case Study</atitle><btitle>2012 16th European Conference on Software Maintenance and Reengineering</btitle><stitle>csmr</stitle><date>2012-03</date><risdate>2012</risdate><spage>397</spage><epage>402</epage><pages>397-402</pages><issn>1534-5351</issn><eissn>2640-7574</eissn><isbn>9781467309844</isbn><isbn>1467309842</isbn><eisbn>9780769546667</eisbn><eisbn>0769546668</eisbn><abstract>Web applications manage increasingly large amounts of sensitive information and often need to implement access control (AC) models. However, documentation about the implemented AC model is often sparse and few, if no tool exists to support AC model investigation. Based on the results of a previous study, we show how formal concept analysis (FCA) can support the understanding and visualization of reverse-engineered AC models. Results of applying FCA to Moodle, a medium-sized (625 473 LOC) Web application, are presented and discussed. We show how FCA enhances the overall comprehension of reverse-engineered AC models and sheds light on previously unknown features of Moodle's AC model.</abstract><pub>IEEE</pub><doi>10.1109/CSMR.2012.50</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1534-5351 |
ispartof | 2012 16th European Conference on Software Maintenance and Reengineering, 2012, p.397-402 |
issn | 1534-5351 2640-7574 |
language | eng |
recordid | cdi_ieee_primary_6178886 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control access control models Analytical models Automata Context Documentation formal concept analysis Lattices Mathematical model reverse-engineering web applications |
title | Investigation of Access Control Models with Formal Concept Analysis: A Case Study |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-13T23%3A23%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Investigation%20of%20Access%20Control%20Models%20with%20Formal%20Concept%20Analysis:%20A%20Case%20Study&rft.btitle=2012%2016th%20European%20Conference%20on%20Software%20Maintenance%20and%20Reengineering&rft.au=Gauthier,%20F.&rft.date=2012-03&rft.spage=397&rft.epage=402&rft.pages=397-402&rft.issn=1534-5351&rft.eissn=2640-7574&rft.isbn=9781467309844&rft.isbn_list=1467309842&rft_id=info:doi/10.1109/CSMR.2012.50&rft_dat=%3Cieee_6IE%3E6178886%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769546667&rft.eisbn_list=0769546668&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6178886&rfr_iscdi=true |