Buyens, KoenKoenBuyensScandariato, RiccardoRiccardoScandariatoJoosen, WouterWouterJoosen2023-03-072023-03-072011-11-09Software and Systems Modeling 12 (2): 331-348 (2013-05-01)http://hdl.handle.net/11420/14956Due to the lack of both precise definitions and effective software engineering methodologies, security design principles are often neglected by software architects, resulting in potentially high-risk threats to systems. This work lays the formal foundations for understanding the security design principle of least privilege in software architectures and provides a technique to identify violations against this principle. The technique can also be leveraged to analyze violations against the security design principle of separation of duties. The proposed approach is supported by tools and has been validated in four case studies, two of which are presented in detail in this paper.en1619-1374Software and systems modeling20112331348SpringerLeast privilegeSecurity analysisSoftware architectureInformatikLeast privilege analysis in software architecturesJournal Article10.1007/s10270-011-0218-8Other