Abstract
We present a set of modeling constructs and reasoning tools that extend the use of computer-supported conceptual modeling for information systems to the study of security aspects. The modeling framework is the Group Security Model (GSM) which describes access rights through a teamwork-oriented organizational model. Reasoning about GSM application models is enabled by representing them in a deductive and object-oriented database language, Telos. A prototype implementation in the software information system ConceptBase is reported.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1993 ECSC — EEC — EAEC, Brussels — Luxembourg
About this chapter
Cite this chapter
Steinke, G. (1993). Modeling Security Requirements in Information Systems. In: Jarke, M. (eds) Database Application Engineering with DAIDA. Research Reports ESPRIT, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-84875-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-84875-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56291-7
Online ISBN: 978-3-642-84875-9
eBook Packages: Springer Book Archive