A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Identifying and Resolving Least Privilege Violations in Software Architectures
2009
2009 International Conference on Availability, Reliability and Security
Supporting a security principle, such as least privilege, in a software architecture is difficult. Systematic rules are lacking, no guidance explains how to apply the principle in practice. As a result, security principles are often neglected. This lowers the overall security level of the software system and the cost of fixing such problems later on in the development cycle is high. We propose an improvement in supporting least privilege in software architectures. We have identified
doi:10.1109/ares.2009.48
dblp:conf/IEEEares/BuyensWJ09
fatcat:efdimchlp5b5rgtun4ehzuzv3y