23.02.2015 Views

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 14. ATM model state after quick fix application<br />

A possible solution model is demonstrated on the Figure 14. Once either the engineer<br />

or the exploration found the complex change reaction that corrects the least privilege<br />

violation, the framework can store it for future use. In this case, the precondition of the<br />

reaction is the goal, and the signature is the violation. The included simple operations<br />

replace the single delegation of permission with similar relations on the subparts, and<br />

finally remove the relations that are not needed since the data is not used.<br />

<strong>D.3.3</strong> Algorithms for Incremental Requirements Models<br />

Evaluation and Transformation| version 1.19 | page 31/136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!