D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Figure 14. ATM model state after quick fix application<br />
A possible solution model is demonstrated on the Figure 14. Once either the engineer<br />
or the exploration found the complex change reaction that corrects the least privilege<br />
violation, the framework can store it for future use. In this case, the precondition of the<br />
reaction is the goal, and the signature is the violation. The included simple operations<br />
replace the single delegation of permission with similar relations on the subparts, and<br />
finally remove the relations that are not needed since the data is not used.<br />
<strong>D.3.3</strong> Algorithms for Incremental Requirements Models<br />
Evaluation and Transformation| version 1.19 | page 31/136