메뉴 건너뛰기




Volumn , Issue , 2015, Pages 655-664

SysML-Sec: A model driven approach for designing safe and secure systems

Author keywords

Embedded systems; Model driven engineering; Safety; Security; SysML

Indexed keywords

ACCIDENT PREVENTION; EMBEDDED SYSTEMS; ITERATIVE METHODS; SAFETY ENGINEERING;

EID: 84939500992     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0005402006550664     Document Type: Conference Paper
Times cited : (60)

References (37)
  • 1
    • 84860619315 scopus 로고    scopus 로고
    • Reducing the window of opportunity for android malware. Gotta catch'em all
    • Apvrille, A. and Strazzere, T. (2012). Reducing the window of opportunity for android malware. gotta catch'em all. Journal in Computer Virology, 8(1-2):61-71.
    • (2012) Journal in Computer Virology , vol.8 , Issue.1-2 , pp. 61-71
    • Apvrille, A.1    Strazzere, T.2
  • 2
    • 84883705094 scopus 로고    scopus 로고
    • Prototyping an embedded automotive system from its uml/sysml models
    • Toulouse, France
    • Apvrille, L. and Becoulet, A. (2012). Prototyping an Embedded Automotive System from its UML/SysML Models. In ERTSS'2012, Toulouse, France.
    • (2012) ERTSS'2012
    • Apvrille, L.1    Becoulet, A.2
  • 3
    • 84939482266 scopus 로고    scopus 로고
    • Avatar/ttool : Un environnement en mode libre pour sysml temps réel
    • Apvrille, L. and De Saqui Sannes, P. (2011). AVATAR/TTool : un environnement en mode libre pour SysML temps réel. Génie Logiciel, (98):22-26.
    • (2011) Génie Logiciel , vol.98 , pp. 22-26
    • Apvrille, L.1    De Saqui Sannes, P.2
  • 5
    • 84939525729 scopus 로고    scopus 로고
    • Real-time distributed systems dimensioning and validation: The turtle method
    • Apvrille, L., Mifdaoui, A., and De Saqui-Sannes, P. (2010). Real-time distributed systems dimensioning and validation: The turtle method. Studia Informatica Universalis, 8(3):47-69.
    • (2010) Studia Informatica Universalis , vol.8 , Issue.3 , pp. 47-69
    • Apvrille, L.1    Mifdaoui, A.2    De Saqui-Sannes, P.3
  • 7
    • 84939519037 scopus 로고    scopus 로고
    • Sysml-sec: A sysml environment for the design and development of secure embedded systems
    • Yokohama, Japan
    • Apvrille, L. and Roudier, Y. (2013). SysML-Sec: A SysML environment for the design and development of secure embedded systems. In APCOSEC 2013, Yokohama, Japan.
    • (2013) APCOSEC 2013
    • Apvrille, L.1    Roudier, Y.2
  • 12
    • 35048861846 scopus 로고    scopus 로고
    • Timed automata: Semantics, algorithms and tools
    • W. Reisig and G. Rozenberg (eds.), LNCS 3098, Springer-Verlag
    • Bengtsson, J. and Yi., W. (2004). Timed automata: Semantics, algorithms and tools. In Lecture Notes on Concurrency and Petri Nets, pages 87-124. W. Reisig and G. Rozenberg (eds.), LNCS 3098, Springer-Verlag.
    • (2004) Lecture Notes on Concurrency and Petri Nets , pp. 87-124
    • Bengtsson, J.1    Yi, W.2
  • 13
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet, B. (2009). Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security, 17(4):363-434.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 14
    • 84961326729 scopus 로고    scopus 로고
    • The integration of safety and security requirements
    • D. P. Eames, D. P. and Moffett, J. (1999). The integration of safety and security requirements. In SAFECOMP, pages 468-480.
    • (1999) SAFECOMP , pp. 468-480
    • Eames, D.P.D.P.1    Moffett, J.2
  • 15
    • 84938714733 scopus 로고    scopus 로고
    • Exploiting the ios kernel
    • Esser, S. (2011). Exploiting the iOS Kernel. In BlackHat 2011.
    • (2011) BlackHat 2011
    • Esser, S.1
  • 17
    • 0742293360 scopus 로고    scopus 로고
    • AI Memo 2002-008, Massachusetts Institute of Technology, Artificial Intelligence Laboratory. Technical report
    • Huang, A. (2002). Keeping Secrets in Hardware: the Microsoft XBox Case Study, AI Memo 2002-008, Massachusetts Institute of Technology, Artificial Intelligence Laboratory. Technical report.
    • (2002) Keeping Secrets in Hardware: The Microsoft Xbox Case Study
    • Huang, A.1
  • 20
    • 80855147327 scopus 로고    scopus 로고
    • Tepe: A sysml language for time-constrained property modeling and formal verification
    • Knorreck, D., Apvrille, L., and De Saqui-Sannes, P. (2011). TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification. ACM SIGSOFT Software Engineering Notes, 36(1):1-8.
    • (2011) ACM SIGSOFT Software Engineering Notes , vol.36 , Issue.1 , pp. 1-8
    • Knorreck, D.1    Apvrille, L.2    De Saqui-Sannes, P.3
  • 22
    • 84939549704 scopus 로고    scopus 로고
    • Russian cybercriminals on the move: Profiting from mobile malware
    • Vancouver, Canada
    • Maslennikov, D. (2010). Russian cybercriminals on the move: profiting from mobile malware. In The 20th Virus Bulletin Internation Conference, pages 84-89, Vancouver, Canada.
    • (2010) The 20th Virus Bulletin Internation Conference , pp. 84-89
    • Maslennikov, D.1
  • 23
    • 84939528495 scopus 로고    scopus 로고
    • Scada security and terrorism: We're not crying Wolf
    • available at:, USA
    • Maynor, D. (2006). Scada security and terrorism: We're not crying wolf! In Invited presentation at BlackHat BH 2006. Presentation available at: https://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Maynor-Graham-up.pdf, USA.
    • (2006) Invited Presentation at BlackHat BH 2006. Presentation
    • Maynor, D.1
  • 25
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • Nuseibeh, B. (2001). Weaving Together Requirements and Architectures. IEEE Computer, 34(3):115-117.
    • (2001) IEEE Computer , vol.34 , Issue.3 , pp. 115-117
    • Nuseibeh, B.1
  • 26
    • 84939492956 scopus 로고    scopus 로고
    • Omg profile for scheduling
    • OMG
    • OMG (2005). OMG Profile for Scheduling, Performance and Time. In http://www.omg.org/spec/SPTP/.
    • (2005) Performance and Time
  • 29
    • 84868221170 scopus 로고    scopus 로고
    • Crossfertilization between safety and security engineering
    • Pietre-Cambacedes, L. and Bouissou, M. (2013). Crossfertilization between safety and security engineering. Rel. Eng. & Sys. Safety, 110:110-126.
    • (2013) Rel. Eng. & Sys. Safety , vol.110 , pp. 110-126
    • Pietre-Cambacedes, L.1    Bouissou, M.2
  • 31
    • 84875249203 scopus 로고    scopus 로고
    • Comparing risk identification techniques for safety and security requirements
    • Raspotnig, C. and Opdahl, A. L. (2013). Comparing risk identification techniques for safety and security requirements. Journal of Systems and Software, 86(4):1124-1151.
    • (2013) Journal of Systems and Software , vol.86 , Issue.4 , pp. 1124-1151
    • Raspotnig, C.1    Opdahl, A.L.2
  • 34
    • 84889049571 scopus 로고    scopus 로고
    • Aircraft hacking
    • Amsterdam, The Netherlands
    • Teso, H. (2013). Aircraft Hacking. In HITB Security Conference, Amsterdam, The Netherlands.
    • (2013) HITB Security Conference
    • Teso, H.1
  • 35
    • 69549136179 scopus 로고    scopus 로고
    • Engineering requirements for system reliability and security
    • Van Lamsweerde, A. (2007). Engineering Requirements for System Reliability and Security. Software System Reliability and Security, 9:196-238.
    • (2007) Software System Reliability and Security , vol.9 , pp. 196-238
    • Van Lamsweerde, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.