메뉴 건너뛰기




Volumn 80, Issue 5, 2007, Pages 700-710

Intrusion detection aware component-based systems: A specification-based framework

Author keywords

Component security; Component based software engineering; Intrusion detection; UML profile

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER SOFTWARE REUSABILITY; DATA STRUCTURES; INTRUSION DETECTION; REAL TIME CONTROL;

EID: 33847617890     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2006.08.017     Document Type: Article
Times cited : (22)

References (36)
  • 1
    • 0001429450 scopus 로고    scopus 로고
    • New age of software development: how component-based software engineering changes the way of software development
    • IEEE Computer Society Press, Kyoto, Japan
    • Aoyama M. New age of software development: how component-based software engineering changes the way of software development. Proceedings of International Workshop on Component-Based Software Engineering (1998), IEEE Computer Society Press, Kyoto, Japan
    • (1998) Proceedings of International Workshop on Component-Based Software Engineering
    • Aoyama, M.1
  • 2
    • 33847646152 scopus 로고    scopus 로고
    • ArgoUML, 2006. Available from: , accessed in January 2006.
  • 3
    • 33847651192 scopus 로고    scopus 로고
    • Component-based software development for embedded systems - an introduction
    • Component-Based Software Development for Embedded Systems. Atkinson C., Bunse C., Gross H., and Peper C. (Eds), Springer-Verlag
    • Atkinson C., Bunse C., Peper C., and Gross H. Component-based software development for embedded systems - an introduction. In: Atkinson C., Bunse C., Gross H., and Peper C. (Eds). Component-Based Software Development for Embedded Systems. Lecture Notes in Computer Science Vol. 3778 (2005), Springer-Verlag 1-7
    • (2005) Lecture Notes in Computer Science , vol.3778 , pp. 1-7
    • Atkinson, C.1    Bunse, C.2    Peper, C.3    Gross, H.4
  • 4
    • 33847618645 scopus 로고    scopus 로고
    • Bond, A., Pahlsson, N., 2004. A Quantitative Evaluation Framework for Component Security in Distributed Information Systems, Undergraduate thesis Y-level (Information Theory), Linkopings University, Linkopings, Sweden.
  • 5
    • 0032163727 scopus 로고    scopus 로고
    • The current state of CBSE
    • Brown A., and Wallnau K. The current state of CBSE. IEEE Software 15 5 (1997) 37-46
    • (1997) IEEE Software , vol.15 , Issue.5 , pp. 37-46
    • Brown, A.1    Wallnau, K.2
  • 6
    • 33847630314 scopus 로고    scopus 로고
    • Brucker, A., Wolff, B., 2001. Testing distributed component based systems using UML/OCL, In Informatik 2001. Tagungsband der GI/ÖCG Jahrestagung, 1 (157).
  • 7
    • 33847640864 scopus 로고    scopus 로고
    • Common Criteria, 1999. Common Criteria for Information Technology Evaluation, Part 1: Introduction and General Model, Technical Report, (CCIMB-99-031), Version 2.1, Common Criteria, USA.
  • 8
    • 33847612295 scopus 로고    scopus 로고
    • Common Criteria, 1999. Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements, (CCIMB-99-032), Version 2.1, Common Criteria, USA.
  • 10
    • 33847678850 scopus 로고    scopus 로고
    • DARPA, 1999. DARPA Intrusion Detection Evaluation at MIT Lincoln Laboratory, Available from: , accessed in January 2006.
  • 11
    • 10044261258 scopus 로고    scopus 로고
    • Gousios, G., Aivaloglou, E., Gritzallis S., 2005. Distributed component architectures security issues, Computer Standards and Interfaces, Elsevier Science Inc., New York, USA, 27 (3), 269-284.
  • 13
    • 0034872904 scopus 로고    scopus 로고
    • Trust-adapted enforcement of security policies in distributed component-structured applications
    • IEEE Computer Society Press, Washington, USA
    • Herrmann P., and Krumm H. Trust-adapted enforcement of security policies in distributed component-structured applications. Proceedings of the sixth IEEE Symposium on Computers and Communications (2001), IEEE Computer Society Press, Washington, USA 2-8
    • (2001) Proceedings of the sixth IEEE Symposium on Computers and Communications , pp. 2-8
    • Herrmann, P.1    Krumm, H.2
  • 14
    • 34250005793 scopus 로고    scopus 로고
    • Hussein, M., Zulkernine, M., 2006. UMLintr: a UML profile for specifying intrusions, In: Proceedings of the 13th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, IEEE Computer Society Press, Potsdam, Germany, 279-286.
  • 16
    • 33847643979 scopus 로고    scopus 로고
    • Component-Based Development of Dependable Systems with UML
    • Component-Based Software Development for Embedded Systems. Atkinson C., Bunse C., Gross H., and Peper C. (Eds), Springer-Verlag
    • Jurjens J., and Wagner S. Component-Based Development of Dependable Systems with UML. In: Atkinson C., Bunse C., Gross H., and Peper C. (Eds). Component-Based Software Development for Embedded Systems. Lecture Notes in Computer Science vol. 3778 (2005), Springer-Verlag 320-344
    • (2005) Lecture Notes in Computer Science , vol.3778 , pp. 320-344
    • Jurjens, J.1    Wagner, S.2
  • 17
    • 33847659922 scopus 로고    scopus 로고
    • Kendall, K., 1999. A Database of Computer Attacks for the Evaluation of Intrusion Intrusion Detection Systems, M.Sc. Thesis, MIT, USA.
  • 18
    • 0344235406 scopus 로고    scopus 로고
    • A security characterisation framework for trustworthy component-based software systems
    • IEEE Computer Society Press, Washington, DC, USA
    • Khan K., and Han J. A security characterisation framework for trustworthy component-based software systems. Proceedings of the 27th Annual International Conference on Computer Software and Applications (2003), IEEE Computer Society Press, Washington, DC, USA 164-169
    • (2003) Proceedings of the 27th Annual International Conference on Computer Software and Applications , pp. 164-169
    • Khan, K.1    Han, J.2
  • 19
    • 33646546963 scopus 로고    scopus 로고
    • Deriving systems level security properties of component-based composite systems
    • IEEE Computer Society Press, Brisbane, Australia
    • Khan K., and Han J. Deriving systems level security properties of component-based composite systems. Proceedings of the Australian Conference on Software Engineering (2005), IEEE Computer Society Press, Brisbane, Australia 334-343
    • (2005) Proceedings of the Australian Conference on Software Engineering , pp. 334-343
    • Khan, K.1    Han, J.2
  • 20
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: a specification-based approach
    • IEEE Computer Society Press, Oakland, CA, USA
    • Ko C., Ruschitzka M., and Levitt K. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. IEEE Symposium on Security and Privacy (1997), IEEE Computer Society Press, Oakland, CA, USA 175-187
    • (1997) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 21
    • 3242756924 scopus 로고    scopus 로고
    • Embedded systems security
    • Koopman P. Embedded systems security. IEEE Computer 37 7 (2004) 95-97
    • (2004) IEEE Computer , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 22
    • 33847630313 scopus 로고    scopus 로고
    • Korba, J., 2000. Windows NT Attacks for the Evaluation of Intrusion Detection Systems, M.Sc. Thesis, MIT, USA.
  • 23
    • 33847643545 scopus 로고    scopus 로고
    • Lund, M., Hogganvik, I., Seehusen, F., Stolen, K., 2003. UML Profile for Security Assessment, Technical Report, SINTEF ICT, Norway.
  • 24
    • 33847673891 scopus 로고    scopus 로고
    • Mingins, C., Chan, C., 2002. Building trust in third-party components using component wrappers in the .NET frameworks, In: Proceedings of the Fortieth International Conference on Tools Pacific, ACM International Conference Proceeding Series, Sydney, Australia, 153-157.
  • 25
    • 33847628677 scopus 로고    scopus 로고
    • Object Management Group, 2004. UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical Report, Object Management Group, Needham, MA, USA.
  • 26
    • 33847611419 scopus 로고    scopus 로고
    • Object Management Group, 2005. Unified Modeling Language: Superstructure, Technical Report, Object Management Group, Needham, MA, USA.
  • 28
    • 33847684175 scopus 로고    scopus 로고
    • Rits, M., 2003. Component Adaptability and Security, M.Sc. Thesis, University of Nice Sophia-Antipolis, France.
  • 29
    • 0038011179 scopus 로고    scopus 로고
    • Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S., 2002. Specification-based anomaly detection: a new approach for detecting network intrusions, In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, USA, 265-274.
  • 30
    • 33847654566 scopus 로고    scopus 로고
    • Selic, B., Rumbaugh, J., 1998. Using UML for Modeling Complex Real-Time Systems, Technical Report, ObjecTime Limited, Canada.
  • 32
    • 84947547225 scopus 로고    scopus 로고
    • Uppuluri, P., Sekar, R., 2001. Experiences with specification-based intrusion detection. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection. Springer-Verlag, 2212, 172-189.
  • 33
    • 33847686629 scopus 로고    scopus 로고
    • Vankamamidi, R., 2001. ASL: A Specification Language for Intrusion Detection and Network Monitoring, M.Sc. Thesis, Iowa State University, Iowa, USA.
  • 34
    • 33847618187 scopus 로고    scopus 로고
    • Vigna, G., Eckmann, S.T., Kemmerer, R.A., 2000. Attack languages, In: Proceedings of the IEEE Information Survivability Workshop, IEEE Computer Society Press, Boston, MA, USA, 163-166.
  • 35
    • 33845206869 scopus 로고    scopus 로고
    • Software security engineering: towards unifying software engineering with security engineering
    • Warkentin M., and Vaughn R. (Eds), Idea Group Publishing
    • Zulkernine M., and Ahamed S. Software security engineering: towards unifying software engineering with security engineering. In: Warkentin M., and Vaughn R. (Eds). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (2006), Idea Group Publishing 215-233
    • (2006) Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues , pp. 215-233
    • Zulkernine, M.1    Ahamed, S.2
  • 36
    • 4944256309 scopus 로고    scopus 로고
    • Towards automatic monitoring of component-based software systems
    • Zulkernine M., and Seviora R. Towards automatic monitoring of component-based software systems. Journal of Systems and Software 74 1 (2005) 15-24
    • (2005) Journal of Systems and Software , vol.74 , Issue.1 , pp. 15-24
    • Zulkernine, M.1    Seviora, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.