Denisse Muñante Arzapalo

Learn More
In the field of access control, many security breaches occur because of a lack of early means to evaluate if access control policies are adequate to satisfy privileges requested by subjects which try to perform actions on objects. This paper proposes an approach based on UMLsec, to tackle this problem. We propose to extend UMLsec, and to add OrBAC elements.(More)
Information systems (ISs) are composed of functional requirements (FRs) and non-functional requirements (NFRs). An NFR does not determine the function of the system itself, but the quality characteristics of an IS; for example, error handling, auditing, and access control. Non-functional requirements are often included in the coding phase of the IS, and(More)
  • 1