메뉴 건너뛰기




Volumn , Issue , 2005, Pages 322-331

Sound methods and effective tools for model-based security engineering with UML

Author keywords

Biometric authentication; Cryptographic protocol; Security; UML; Unified Modeling Language; Verification; Verification framework

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; SOFTWARE ENGINEERING;

EID: 85086954040     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1062455.1062519     Document Type: Conference Paper
Times cited : (12)

References (32)
  • 1
    • 0002652530 scopus 로고    scopus 로고
    • Security protocols and their properties
    • F. Bauer and R Steinbrüggen, editors, IOS Press, Amsterdam,. 20th International Summer School, Marktoberdorf, Germany
    • M. Abadi. Security protocols and their properties. In F. Bauer and R Steinbrüggen, editors, Foundations of Secure Computation, pages 39-60. IOS Press, Amsterdam, 2000. 20th International Summer School, Marktoberdorf, Germany.
    • (2000) Foundations of Secure Computation , pp. 39-60
    • Abadi, M.1
  • 2
    • 52649095905 scopus 로고    scopus 로고
    • Automatically detecting and visualising errors in UML diagrams
    • L. Campbell, B. Cheng, W. McUmber, and K. Stirewalt. Automatically detecting and visualising errors in UML diagrams. Requir. Eng., 7(4):264-287, 2002.
    • (2002) Requir. Eng. , vol.7 , Issue.4 , pp. 264-287
    • Campbell, L.1    Cheng, B.2    McUmber, W.3    Stirewalt, K.4
  • 3
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • E. Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11(2):189-216, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 5
    • 84944067116 scopus 로고    scopus 로고
    • DPS: An architectural style for development of secure software
    • G. Davida, Y. Frankel, and O. Rees, editors, International Conference on Infrastructure Security (InfraSec 2002), Springer
    • P. Fenkam, H. Gall, M. Jazayeri, and C. Krügel. DPS: An architectural style for development of secure software. In G. Davida, Y. Frankel, and O. Rees, editors, International Conference on Infrastructure Security (InfraSec 2002), volume 2437 of LNCS, pages 180-198. Springer, 2002.
    • (2002) LNCS , vol.2437 , pp. 180-198
    • Fenkam, P.1    Gall, H.2    Jazayeri, M.3    Krügel, C.4
  • 6
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), Springer
    • P. Giorgini, F. Massacci, and J. Mylopoulos. Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), volume 2813 of LNCS, pages 263-276. Springer, 2003.
    • (2003) LNCS , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 8
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction: Developing a commercial secure system
    • A. Hall and R. Chapman. Correctness by construction: Developing a commercial secure system. IEEE Software, 19(1):18-25, 2002.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 9
    • 33244490092 scopus 로고    scopus 로고
    • Specification modeling and validation applied to a family of network security products
    • R. Hall. Specification modeling and validation applied to a family of network security products. In ASE01 [10], pages 71-80.
    • ASE01 , Issue.10 , pp. 71-80
    • Hall, R.1
  • 11
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, Springer
    • J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425. Springer, 2002.
    • (2002) LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 12
    • 0036037169 scopus 로고    scopus 로고
    • Using UMLsec and goal-trees for secure systems development
    • G. Lamont, H. Haddad, G. Papadopoulos, and B. Panda, editors, ACM Press
    • J. Jurjens. Using UMLsec and goal-trees for secure systems development. In G. Lamont, H. Haddad, G. Papadopoulos, and B. Panda, editors, Proceedings of the 2002 Symposium of Applied Computing (SAC), pages 1026-1031. ACM Press, 2002.
    • (2002) Proceedings of the 2002 Symposium of Applied Computing (SAC) , pp. 1026-1031
    • Jurjens, J.1
  • 14
    • 33244458485 scopus 로고    scopus 로고
    • J. Jürjens, E. Fernandez, R. France, and B. Rumpe, editors. TU München Technical Report,. UML 2004 satellite workshop proceedings
    • J. Jürjens, E. Fernandez, R. France, and B. Rumpe, editors. Critical Systems Development with UML (CSDUML 2004), TU München Technical Report, 2004. UML 2004 satellite workshop proceedings.
    • (2004) Critical Systems Development with UML (CSDUML 2004)
  • 15
    • 23944491305 scopus 로고    scopus 로고
    • Automated verification of UMLsec models for security requirements
    • J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2004 - The Unified Modeling Language, Springer
    • J. Jürjens and P. Shabalin. Automated verification of UMLsec models for security requirements. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2004 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425. Springer, 2004.
    • (2004) LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1    Shabalin, P.2
  • 16
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • May
    • R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, May 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.1
  • 19
    • 84947758978 scopus 로고    scopus 로고
    • Formalising UML state machines for model checking
    • R. France and B. Rumpe, editors, The Unified Modeling Language (UML 1999), Springer
    • J. Lilius and I. Porres. Formalising UML state machines for model checking. In R. France and B. Rumpe, editors, The Unified Modeling Language (UML 1999), volume 1723 of LNCS, pages 430-445. Springer, 1999.
    • (1999) LNCS , vol.1723 , pp. 430-445
    • Lilius, J.1    Porres, I.2
  • 20
    • 0026152198 scopus 로고
    • A system for the specification and analysis of key management protocols
    • C. Meadows. A system for the specification and analysis of key management protocols. In IEEE Symposium on Security and Privacy, pages 182-195, 1991.
    • (1991) IEEE Symposium on Security and Privacy , pp. 182-195
    • Meadows, C.1
  • 23
    • 7744220233 scopus 로고    scopus 로고
    • Netbeans project. Open source. Available from http://mdr.netbeans.org, 2003.
    • (2003) Open Source
  • 25
    • 84957071248 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols with SETHEO
    • W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), Springer
    • J. Schumann, Automatic verification of cryptographic protocols with SETHEO. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), volume 1249 of LNCS, pages 87-100. Springer, 1997.
    • (1997) LNCS , vol.1249 , pp. 87-100
    • Schumann, J.1
  • 27
    • 0037764276 scopus 로고    scopus 로고
    • UMLsec tool, 2002-04. Open-source. Accessible at http://www.umlsec.org.
    • (2002) Open-source
  • 28
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • IEEE Computer Society
    • A. van Lamsweerde. Elaborating security requirements by construction of intentional anti-models. In ICSE, pages 148-157. IEEE Computer Society, 2004.
    • (2004) ICSE , pp. 148-157
    • Van Lamsweerde, A.1
  • 31
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16)
    • C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of LNCS, pages 314-328, 1999.
    • (1999) LNCS , vol.1632 , pp. 314-328
    • Weidenbach, C.1
  • 32
    • 84943191409 scopus 로고    scopus 로고
    • Knowledge base approach to consistency management of UML specification
    • A. Zisman and A. Kozlenkov. Knowledge base approach to consistency management of UML specification. In ASE01 [10], pages 359-363.
    • ASE01 , Issue.10 , pp. 359-363
    • Zisman, A.1    Kozlenkov, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.