2014
DOI: 10.1016/j.eswa.2013.10.064
|View full text |Cite
|
Sign up to set email alerts
|

A formal verification framework for SysML activity diagrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Ouchani, Jarraya, and Mohamed (2011) presents an approach based on probabilistic adversarial interactions between potential attackers and the system design models. These interactions result in a global model as composed SysML activity diagrams that support more additional artifacts than (Ouchani et al, 2014b) such as data objects. The result diagram is translated into PRISM language and a set of security and functional properties are verified against the composed model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ouchani, Jarraya, and Mohamed (2011) presents an approach based on probabilistic adversarial interactions between potential attackers and the system design models. These interactions result in a global model as composed SysML activity diagrams that support more additional artifacts than (Ouchani et al, 2014b) such as data objects. The result diagram is translated into PRISM language and a set of security and functional properties are verified against the composed model.…”
Section: Related Workmentioning
confidence: 99%
“…The approach is restricted on a sub set of SysML activity diagram constructs with control flow (data flow is missed). Ouchani, Mohamed, and Debbabi (2014b) propose a verification framework of SysML activity diagram. The authors address a sub set of SysML activity diagram artifacts with control flow.…”
Section: Related Workmentioning
confidence: 99%
“…Figure C.1 summarises the basic transformation rules for control and object flows when a control node is encountered. We develop these rules from studies conducted by Ouchani et al [125], Herrmann and Kraemer [267], and Störrle [268], and from the semantic interpretation of control nodes provided by UML 2.4.1 [28]. In this appendix, we assume that there are no nested control nodes.…”
Section: Semantic Mappingmentioning
confidence: 99%
“…Transformation of a UML activity diagram into a state machine is the ongoing research subject [125,267]. We capitalise on this research area.…”
Section: Semantic Mappingmentioning
confidence: 99%
See 1 more Smart Citation