Scandariato, RiccardoRiccardoScandariatoBuyens, KoenKoenBuyensJoosen, WouterWouterJoosen2023-03-102023-03-102010-08Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6285 LNCS: 150-165 (2010-11-05)http://hdl.handle.net/11420/14985Due to the lack of both precise definitions and effective software engineering methodologies, security principles are often neglected by software architects, resulting in potentially high-risk threats to the systems. This work lays the formal foundations for the understanding of the least privilege (LP) principle in software architectures and provides a technique to identify LP violations. The proposed approach is supported by tools and has been validated in four case studies, one of which is presented in detail in this paper.enArchitectural analysisLeast privilegeSecurityInformatikAutomated detection of least privilege violations in software architecturesConference Paper10.1007/978-3-642-15114-9_13Other