메뉴 건너뛰기




Volumn 36, Issue 3, 2010, Pages 338-356

Verification and trade-off analysis of security properties in UML system models

Author keywords

Aspect oriented modeling (AOM); Bayesian belief network (BBN); Security analysis; Trade off analysis

Indexed keywords

ALLOY ANALYZERS; ASPECT-ORIENTED; ASPECT-ORIENTED MODELING; BAYESIAN BELIEF NETWORKS; BUDGET CONSTRAINT; FORMAL SECURITY; NON-TRIVIAL TASKS; POTENTIAL ATTACK; PROJECT CONSTRAINTS; RISK-DRIVEN DEVELOPMENT; SECURE SYSTEM; SECURITY ANALYSIS; SECURITY BREACHES; SECURITY MECHANISM; SECURITY PROPERTIES; SECURITY SOLUTIONS; SYSTEM DESIGN; SYSTEM DESIGNERS; SYSTEM MODELS; SYSTEM RISK; SYSTEM SECURITY; TIME-TO-MARKET; TRADE-OFF ANALYSIS;

EID: 77953120075     PISSN: 00985589     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSE.2010.36     Document Type: Article
Times cited : (29)

References (51)
  • 6
    • 27144534308 scopus 로고    scopus 로고
    • Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development
    • S.H. Houmb et al., "Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development," Proc. IEEE Int'l Conf. Eng. Complex Computer Systems, pp. 195-204, 2005.
    • (2005) Proc. IEEE Int'l Conf. Eng. Complex Computer Systems , pp. 195-204
    • Houmb, S.H.1
  • 7
    • 38349180351 scopus 로고    scopus 로고
    • An integrated security verification and security solution design trade-off analysis approach
    • H. Mouratidis and P. Giorgini, eds., IGI Global
    • S.H. Houmb et al., "An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach," Integrating Security and Software Eng.: Advances and Future Vision, H. Mouratidis and P. Giorgini, eds., IGI Global, 2007.
    • (2007) Integrating Security and Software Eng.: Advances and Future Vision
    • Houmb, S.H.1
  • 10
  • 11
    • 27144463943 scopus 로고    scopus 로고
    • Model based risk assessment in a component- based software engineering process: The CORAS approach to identify security risks
    • F. Barbier, ed. Kluwer
    • K. Stølen et al., "Model Based Risk Assessment in a Component- Based Software Engineering Process: The CORAS Approach to Identify Security Risks," Business Component-Based Software Eng., F. Barbier, ed., pp. 189-207, Kluwer, 2002.
    • (2002) Business Component-Based Software Eng. , pp. 189-207
    • Stølen, K.1
  • 12
    • 1942468141 scopus 로고    scopus 로고
    • A UML-based pattern specification technique
    • Mar.
    • R. France et al., "A UML-Based Pattern Specification Technique," IEEE Trans. Software Eng., vol.30, no.3, pp. 193-206, Mar. 2004.
    • (2004) IEEE Trans. Software Eng. , vol.30 , Issue.3 , pp. 193-206
    • France, R.1
  • 13
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to design modeling
    • R. France et al., "Aspect-Oriented Approach to Design Modeling," IEE Proc. Software, vol.151, no.4, pp. 173-186, 2004.
    • (2004) IEE Proc. Software , vol.151 , Issue.4 , pp. 173-186
    • France, R.1
  • 14
    • 85134600809 scopus 로고    scopus 로고
    • Using alloy and UML/OCL to specify run-time configuration management: A case study
    • A. Evans et al., eds.
    • G. Georg, J. Bieman, and R. France, "Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study," Proc. Workshop pUML-Group Held Together with the UML, A. Evans et al., eds., pp. 128-141, 2001.
    • (2001) Proc. Workshop PUML-Group Held Together with the UML , pp. 128-141
    • Georg, G.1    Bieman, J.2    France, R.3
  • 15
    • 60849085437 scopus 로고    scopus 로고
    • An aspect-oriented methodology for designing secure applications
    • G. Georg et al., "An Aspect-Oriented Methodology for Designing Secure Applications," Information and Software Technology, vol.51, no.5, pp. 846-864, 2009.
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 846-864
    • Georg, G.1
  • 17
    • 77953122512 scopus 로고    scopus 로고
    • 2009
    • Alloy, http://alloy.mit.edu, 2009.
  • 26
    • 77953123563 scopus 로고    scopus 로고
    • 2009
    • ArgoUML, http://argouml.tigris.org, 2009.
  • 28
    • 33745622446 scopus 로고    scopus 로고
    • UML2ALLOY: A tool for light- weight modelling of discrete event system
    • N. Guimarães and P.T. Isaías, eds.
    • B. Bordbar and K. Anastasakis, "UML2ALLOY: A Tool for Light- Weight Modelling of Discrete Event System," Proc. Int'l Conf. Applied Computing, N. Guimarães and P.T. Isaías, eds., pp. 209-216, 2005.
    • (2005) Proc. Int'l Conf. Applied Computing , pp. 209-216
    • Bordbar, B.1    Anastasakis, K.2
  • 31
    • 60949103111 scopus 로고    scopus 로고
    • Integrating model-based security risk management into ebusiness systems development: The CORAS approach
    • J. Monteiro, P. Swatman, and L. Tavares, eds.
    • T. Dimitrakos et al., "Integrating Model-Based Security Risk Management into Ebusiness Systems Development: The CORAS Approach," Proc. IFIP Conf. E-Commerce, E-Business, E-Government, J. Monteiro, P. Swatman, and L. Tavares, eds., pp. 159-175, 2002.
    • (2002) Proc. IFIP Conf. E-Commerce, E-Business, E-Government , pp. 159-175
    • Dimitrakos, T.1
  • 38
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Comm. ACM, vol.21, no.12, pp. 993-999, 1978.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 39
    • 84974774507 scopus 로고
    • Towards operational measures of computer security
    • B. Littlewood et al., "Towards Operational Measures of Computer Security," J. Computer Security, vol.2, nos. 2/3, pp. 211-230, 1993.
    • (1993) J. Computer Security , vol.2 , Issue.2-3 , pp. 211-230
    • Littlewood, B.1
  • 40
  • 41
    • 0038620405 scopus 로고    scopus 로고
    • Making architecture design decisions: An economic approach
    • Carnegie Mellon Univ./Software Eng. Inst.
    • R. Kazman, J. Asundi, and M. Klein, "Making Architecture Design Decisions: An Economic Approach," Technical Report CMU/SEI- 2002-TR-035, Carnegie Mellon Univ./Software Eng. Inst., 2002.
    • (2002) Technical Report CMU/SEI-2002-TR-035
    • Kazman, R.1    Asundi, J.2    Klein, M.3
  • 42
    • 47849124657 scopus 로고    scopus 로고
    • Applying real options thinking to information security in networked organizations
    • Univ. of Twente
    • M. Daneva, "Applying Real Options Thinking to Information Security in Networked Organizations," CTIT Report TR-CTIT-06-11, Univ. of Twente, 2006.
    • (2006) CTIT Report TR-CTIT-06-11
    • Daneva, M.1
  • 43
    • 0036754796 scopus 로고    scopus 로고
    • Managing information technology investment risk: A real options perspective
    • M. Benaroch, "Managing Information Technology Investment Risk: A Real Options Perspective," J. Management Information Systems, vol.19, no.2, pp. 43-84, 2002.
    • (2002) J. Management Information Systems , vol.19 , Issue.2 , pp. 43-84
    • Benaroch, M.1
  • 45
    • 0001094070 scopus 로고
    • The use of the CCTA Risk analysis and management methodology CRAMM in health information systems
    • K.C. Lun et al., eds.
    • B. Barber and J. Davey, "The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems," Proc. Medical Informatics Conf., K.C. Lun et al., eds., pp. 1589-1593, 1992.
    • (1992) Proc. Medical Informatics Conf. , pp. 1589-1593
    • Barber, B.1    Davey, J.2
  • 48
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol ising FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • G. Lowe, "Breaking and Fixing the Needham-Schröeder Public- Key Protocol Using FDR," Proc. Int'l Conf. Tools and Algorithms for Construction and Analysis of Systems, T. Margaria and B. Steffen, eds., pp. 147-166, 1996. (Pubitemid 126050413)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1055 , pp. 147-166
    • Lowe, G.1
  • 49
    • 31044452475 scopus 로고    scopus 로고
    • Validating UML and OCL models in USE by automatic snapshot generation
    • M. Gogolla, J. Bohling, and M. Richters, "Validating UML and OCL Models in USE by Automatic Snapshot Generation," Software and System Modeling, vol.4, no.4, pp. 386-398, 2005.
    • (2005) Software and System Modeling , vol.4 , Issue.4 , pp. 386-398
    • Gogolla, M.1    Bohling, J.2    Richters, M.3
  • 50
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: From UML Models to Access Control Infrastructures," ACM Trans. Software Eng. and Methodology, vol.15, no.1, pp. 39-91, 2006.
    • (2006) ACM Trans. Software Eng. and Methodology , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 51
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • D. Basin et al., "Automated Analysis of Security-Design Models," Information and Software Technology, vol.51, no.5, pp. 815-831, 2009.
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.