"Shifting Access Control Left"using Asset and Goal Models

πŸ“… 2025-04-24
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Early system design suffers from ambiguous access control requirements, uneven distribution of domain knowledge, and cognitive asymmetry among stakeholders. Method: This paper proposes a tool-supported method that embeds asset and goal models as boundary objects into the requirements and architecture phases. It introduces a lightweight UML/SysML-inspired modeling language to explicitly represent access control concerns and integrates model comparison and difference analysis to enhance knowledge transparency and stakeholder alignment. Contribution/Results: The approach enables β€œshifting access control left” in the development lifecycle. Evaluated in a military aviation reusable component adaptation case, it identified six categories of latent access constraint conflicts, reduced requirement clarification cycles by 40%, and significantly improved cross-role collaboration efficiency.

Technology Category

Application Category

πŸ“ Abstract
Access control needs have broad design implications, but access control specifications may be elicited before, during, or after these needs are captured. Because access control knowledge is distributed, we need to make knowledge asymmetries more transparent, and use expertise already available to stakeholders. In this paper, we present a tool-supported technique identifying knowledge asymmetries around access control based on asset and goal models. Using simple and conventional modelling languages that complement different design techniques, we provide boundary objects to make access control transparent, thereby making knowledge about access control concerns more symmetric. We illustrate this technique using a case study example considering the suitability of a reusable software component in a new military air system.
Problem

Research questions and friction points this paper is trying to address.

Identify knowledge asymmetries in access control design
Use asset and goal models for transparent access control
Illustrate technique via military air system case study
Innovation

Methods, ideas, or system contributions that make the work stand out.

Tool-supported technique for access control
Uses asset and goal models
Simple conventional modeling languages
πŸ”Ž Similar Papers
No similar papers found.