메뉴 건너뛰기




Volumn 93, Issue , 2014, Pages 103-152

Advances in model-driven security

Author keywords

Information security; Model driven engineering; Model driven security; Separation of concerns; Survey

Indexed keywords


EID: 84894657237     PISSN: 00652458     EISSN: None     Source Type: Book Series    
DOI: 10.1016/B978-0-12-800162-2.00003-8     Document Type: Chapter
Times cited : (28)

References (106)
  • 1
    • 78650715365 scopus 로고    scopus 로고
    • Model-driven configuration of SELinux policies
    • Springer-Verlag, On the Move to Meaningful Internet Systems: OTM 2009
    • Agreiter B., Breu R. Model-driven configuration of SELinux policies. Lecture Notes in Computer Science 2009, vol. 5871:887-904. Springer-Verlag.
    • (2009) Lecture Notes in Computer Science , vol.5871 , pp. 887-904
    • Agreiter, B.1    Breu, R.2
  • 3
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineering for trust management in SECTET
    • Academy Publisher
    • Alam M., Breu R., Hafner M. Model-driven security engineering for trust management in SECTET. Journal of Software 2007, vol. 2:47-59. Academy Publisher.
    • (2007) Journal of Software , vol.2 , pp. 47-59
    • Alam, M.1    Breu, R.2    Hafner, M.3
  • 11
    • 84894661363 scopus 로고    scopus 로고
    • ATLAS, ATLAS Transformation Language.
    • ATLAS, ATLAS Transformation Language. , 2008. http://www.eclipse.org/m2m/atl/.
    • (2008)
  • 18
    • 33750045718 scopus 로고    scopus 로고
    • Model driven engineering: an emerging technical space
    • Springer-Verlag, Generative and Transformational Techniques in Software Engineering
    • Bezivin J. Model driven engineering: an emerging technical space. Lecture Notes in Computer Science 2006, vol. 4143:36-64. Springer-Verlag.
    • (2006) Lecture Notes in Computer Science , vol.4143 , pp. 36-64
    • Bezivin, J.1
  • 20
    • 26844470176 scopus 로고    scopus 로고
    • Model driven security for inter-organizational workflows in e-Government
    • Springer-Verlag, E-Government: Towards Electronic Democracy
    • Breu R., Hafner M., Weber B., Novak A. Model driven security for inter-organizational workflows in e-Government. Lecture Notes in Computer Science 2005, vol. 3416:122-133. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3416 , pp. 122-133
    • Breu, R.1    Hafner, M.2    Weber, B.3    Novak, A.4
  • 29
    • 45849114411 scopus 로고    scopus 로고
    • A privacy-preserving ehealth protocol compliant with the belgian healthcare system
    • Springer, Proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008
    • Decker B.D., Layouni M., Vangheluwe H., Verslype K. A privacy-preserving ehealth protocol compliant with the belgian healthcare system. Lecture Notes in Computer Science 2008, vol. 5057:118-133. Springer.
    • (2008) Lecture Notes in Computer Science , vol.5057 , pp. 118-133
    • Decker, B.D.1    Layouni, M.2    Vangheluwe, H.3    Verslype, K.4
  • 34
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to early design modelling
    • IEEE Computer Society
    • France R., Ray I., Georg G., Ghosh S. Aspect-oriented approach to early design modelling. IEE Proceedings - Software 2004, vol. 151:173-185. IEEE Computer Society.
    • (2004) IEE Proceedings - Software , vol.151 , pp. 173-185
    • France, R.1    Ray, I.2    Georg, G.3    Ghosh, S.4
  • 36
    • 33750315310 scopus 로고    scopus 로고
    • Towards a MOF/QVT-based domain architecture for model driven security
    • Springer-Verlag, Model Driven Engineering Languages and Systems
    • Hafner M., Alam M., Breu R. Towards a MOF/QVT-based domain architecture for model driven security. Lecture Notes in Computer Science 2006, vol. 4199:275-290. Springer-Verlag.
    • (2006) Lecture Notes in Computer Science , vol.4199 , pp. 275-290
    • Hafner, M.1    Alam, M.2    Breu, R.3
  • 39
    • 33750453781 scopus 로고    scopus 로고
    • SECTET: an extensible framework for the realization of secure inter-organizational workflows
    • Emerald Group Publishing Limited
    • Hafner M., Breu R., Agreiter B., Nowak A. SECTET: an extensible framework for the realization of secure inter-organizational workflows. Internet Research 2006, vol. 16:491-506. Emerald Group Publishing Limited.
    • (2006) Internet Research , vol.16 , pp. 491-506
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 40
    • 47749117634 scopus 로고    scopus 로고
    • Modeling and enforcing advanced access control policies in healthcare systems with SECTET
    • Springer-Verlag, Models in Software Engineering
    • Hafner M., Memon M., Alam M. Modeling and enforcing advanced access control policies in healthcare systems with SECTET. Lecture Notes in Computer Science 2008, vol. 5002:132-144. Springer-Verlag.
    • (2008) Lecture Notes in Computer Science , vol.5002 , pp. 132-144
    • Hafner, M.1    Memon, M.2    Alam, M.3
  • 41
    • 79953186499 scopus 로고    scopus 로고
    • Systematic development of UMLsec design models based on security requirements
    • Springer-Verlag, Fundamental Approaches to Software Engineering
    • Hatebur D., Heisel M., Jürjens J., Schmidt H. Systematic development of UMLsec design models based on security requirements. Lecture Notes in Computer Science 2011, vol. 6603:232-246. Springer-Verlag.
    • (2011) Lecture Notes in Computer Science , vol.6603 , pp. 232-246
    • Hatebur, D.1    Heisel, M.2    Jürjens, J.3    Schmidt, H.4
  • 42
    • 84944688537 scopus 로고    scopus 로고
    • Developing secure networked web-based systems using model-based risk assessment and UMLsec
    • IEEE Computer Society, Chiang Mai, Thailand
    • Houmb S., Jürjens J. Developing secure networked web-based systems using model-based risk assessment and UMLsec. Proceedings of the 10th Asia-Pacific Software Engineering Conference, APSection 2003 2003, 488-497. IEEE Computer Society, Chiang Mai, Thailand.
    • (2003) Proceedings of the 10th Asia-Pacific Software Engineering Conference, APSection 2003 , pp. 488-497
    • Houmb, S.1    Jürjens, J.2
  • 47
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Springer-Verlag, Fundamental Approaches to Software Engineering
    • Jürjens J. Towards development of secure systems using UMLsec. Lecture Notes in Computer Science 2001, vol. 2029:187-200. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 50
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: extending UML for secure systems development
    • Springer-Verlag, UML 2002 - The Unified Modeling Language
    • Jürjens J. UMLsec: extending UML for secure systems development. Lecture Notes in Computer Science 2002, vol. 2460:412-425. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 52
    • 33846318194 scopus 로고    scopus 로고
    • Code security analysis of a biometric authentication system using automated theorem provers
    • IEEE Computer Society, Tucson, Arizona, USA
    • Jürjens J. Code security analysis of a biometric authentication system using automated theorem provers. Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC 2005 2005, 138-149. IEEE Computer Society, Tucson, Arizona, USA.
    • (2005) Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC 2005 , pp. 138-149
    • Jürjens, J.1
  • 54
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • IEEE Computer Society, St. Louis, Missouri, USA
    • Jürjens J. Sound methods and effective tools for model-based security engineering with UML. Proceedings of the 27th International Conference on Software Engineering, ICSE 2005 2005, 322-331. IEEE Computer Society, St. Louis, Missouri, USA.
    • (2005) Proceedings of the 27th International Conference on Software Engineering, ICSE 2005 , pp. 322-331
    • Jürjens, J.1
  • 58
    • 0036818278 scopus 로고    scopus 로고
    • A synthesis of evaluation criteria for software specifications and specification techniques
    • World Scientific
    • Khwaja A., Urban J. A synthesis of evaluation criteria for software specifications and specification techniques. International Journal of Software Engineering and Knowledge Engineering 2002, vol. 12:581-599. World Scientific.
    • (2002) International Journal of Software Engineering and Knowledge Engineering , vol.12 , pp. 581-599
    • Khwaja, A.1    Urban, J.2
  • 60
    • 78649898826 scopus 로고    scopus 로고
    • Aspect-oriented design with reusable aspect models
    • Springer-Verlag, Transactions on Aspect-Oriented Software Development VII
    • Kienzle J., Al Abed W., Fleurey F., Jézéquel J., Klein J. Aspect-oriented design with reusable aspect models. Lecture Notes in Computer Science 2010, vol. 6210:272-320. Springer-Verlag.
    • (2010) Lecture Notes in Computer Science , vol.6210 , pp. 272-320
    • Kienzle, J.1    Al Abed, W.2    Fleurey, F.3    Jézéquel, J.4    Klein, J.5
  • 61
    • 38549162055 scopus 로고    scopus 로고
    • Weaving multiple aspects in sequence diagrams
    • Springer-Verlag, Transactions on Aspect-Oriented Software Development (TAOSD)
    • Klein J., Fleurey F., Jézéquel J. Weaving multiple aspects in sequence diagrams. Lecture Notes in Computer Science 2007, vol. 4620:167-199. Springer-Verlag.
    • (2007) Lecture Notes in Computer Science , vol.4620 , pp. 167-199
    • Klein, J.1    Fleurey, F.2    Jézéquel, J.3
  • 69
    • 77249107213 scopus 로고    scopus 로고
    • Security analysis of a biometric authentication system using UMLsec and JML
    • Springer-Verlag, Model Driven Engineering Languages and Systems
    • Lloyd J., Jürjens J. Security analysis of a biometric authentication system using UMLsec and JML. Lecture Notes in Computer Science 2009, vol. 5795:77-91. Springer-Verlag.
    • (2009) Lecture Notes in Computer Science , vol.5795 , pp. 77-91
    • Lloyd, J.1    Jürjens, J.2
  • 71
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: a UML-based modeling language for model-driven security
    • Springer-Verlag, ≪UML≫2002 - The Unified Modeling Language
    • Lodderstedt T., Basin D., Doser J. SecureUML: a UML-based modeling language for model-driven security. Lecture Notes in Computer Science 2002, vol. 2460:426-441. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 75
    • 84894654771 scopus 로고    scopus 로고
    • Metacase, Domain-Specific Modeling with MetaEdit+: 10 times Faster than UML, White Paper
    • Metacase, Domain-Specific Modeling with MetaEdit+: 10 times Faster than UML, White Paper, 2009.
    • (2009)
  • 80
    • 77949466195 scopus 로고    scopus 로고
    • Formal verification of application-specific security properties in a model-driven approach
    • Springer-Verlag, Engineering Secure Software and Systems
    • Moebius N., Stenzel K., Reif W. Formal verification of application-specific security properties in a model-driven approach. Lecture Notes in Computer Science 2010, vol. 5965:166-181. Springer-Verlag.
    • (2010) Lecture Notes in Computer Science , vol.5965 , pp. 166-181
    • Moebius, N.1    Stenzel, K.2    Reif, W.3
  • 85
    • 11844295391 scopus 로고    scopus 로고
    • Computer automated multi-paradigm modeling: an introduction
    • SAGE Publications
    • Mosterman P.J., Vangheluwe H. Computer automated multi-paradigm modeling: an introduction. Simulation 2004, vol. 80:433-450. SAGE Publications.
    • (2004) Simulation , vol.80 , pp. 433-450
    • Mosterman, P.J.1    Vangheluwe, H.2
  • 89
    • 84861947491 scopus 로고    scopus 로고
    • Mutation-based test case generation via a path selection strategy
    • Elsevier
    • Papadakis M., Malevris N. mutation-based test case generation via a path selection strategy. Information and Software Technology 2012, vol. 54:915-932. Elsevier.
    • (2012) Information and Software Technology , vol.54 , pp. 915-932
    • Papadakis, M.1    Malevris, N.2
  • 91
    • 73149125546 scopus 로고    scopus 로고
    • ModelSec: a generative architecture for model-driven security
    • Verlag der Technischen Universität Graz
    • Sánchez O., Molina F., García-Molina J., Toval A. ModelSec: a generative architecture for model-driven security. Journal of Universal Computer Science 2009, vol. 15:2957-2980. Verlag der Technischen Universität Graz.
    • (2009) Journal of Universal Computer Science , vol.15 , pp. 2957-2980
    • Sánchez, O.1    Molina, F.2    García-Molina, J.3    Toval, A.4
  • 92
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • IEEE Computer Society
    • Sandhu R., Coyne E., Feinstein H., Youman C. Role-based access control models. IEEE Computer 1996, vol. 29:38-47. IEEE Computer Society.
    • (1996) IEEE Computer , vol.29 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 95
    • 0141725642 scopus 로고    scopus 로고
    • Model transformation: the heart and soul of model-driven software development
    • IEEE Computer Society
    • Sendall S., Kozaczynski W. Model transformation: the heart and soul of model-driven software development. IEEE Software 2003, vol. 20:42-45. IEEE Computer Society.
    • (2003) IEEE Software , vol.20 , pp. 42-45
    • Sendall, S.1    Kozaczynski, W.2
  • 97
    • 84894679028 scopus 로고    scopus 로고
    • Separating application and security concerns in modeling software product lines
    • Auerbach Publications Boston, MA, USA
    • Shin M., Gomaa H. Separating application and security concerns in modeling software product lines. Applied Software Product Line Engineering 2009, 337-366. Auerbach Publications Boston, MA, USA. first ed.
    • (2009) Applied Software Product Line Engineering , pp. 337-366
    • Shin, M.1    Gomaa, H.2
  • 102
    • 5744222415 scopus 로고    scopus 로고
    • Scenario modelling with aspects
    • IEEE Computer Society
    • Whittle J., Araújo J. Scenario modelling with aspects. IEE Proceedings - Software 2004, vol. 151:157-172. IEEE Computer Society.
    • (2004) IEE Proceedings - Software , vol.151 , pp. 157-172
    • Whittle, J.1    Araújo, J.2
  • 103
    • 71549130408 scopus 로고    scopus 로고
    • A unified approach for composing UML aspect models based on graph transformation
    • Springer-Verlag, Transactions on Aspect-Oriented Software Development VI
    • Whittle J., Jayaraman P.K., Elkhodary A.M., Moreira A., Araújo J. A unified approach for composing UML aspect models based on graph transformation. Lecture Notes in Computer Science 2009, vol. 5560:191-237. Springer-Verlag.
    • (2009) Lecture Notes in Computer Science , vol.5560 , pp. 191-237
    • Whittle, J.1    Jayaraman, P.K.2    Elkhodary, A.M.3    Moreira, A.4    Araújo, J.5
  • 105
    • 60849089332 scopus 로고    scopus 로고
    • A model-based aspect-oriented framework for building intrusion-aware software systems
    • Elsevier
    • Zhu Z.J., Zulkernine M. A model-based aspect-oriented framework for building intrusion-aware software systems. Information and Software Technology 2009, vol. 51:865-875. Elsevier.
    • (2009) Information and Software Technology , vol.51 , pp. 865-875
    • Zhu, Z.J.1    Zulkernine, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.