2013 20th Asia-Pacific Software Engineering Conference (APSEC) 2013
DOI: 10.1109/apsec.2013.64
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review of Model-Driven Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 36 publications
1
18
0
1
Order By: Relevance
“…In the SMS presented in Nguyen et al (2013), we can find a taxonomy focused on specialized model-driven engineering approaches for supporting the development of systems regarding security (also called model-driven security, MDS). This study shows that authorization, especially access control, and confidentiality are the security concerns that are mostly addressed by MDS.…”
Section: Summary Of Secondary Studies Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the SMS presented in Nguyen et al (2013), we can find a taxonomy focused on specialized model-driven engineering approaches for supporting the development of systems regarding security (also called model-driven security, MDS). This study shows that authorization, especially access control, and confidentiality are the security concerns that are mostly addressed by MDS.…”
Section: Summary Of Secondary Studies Contributionsmentioning
confidence: 99%
“…All but Nguyen et al (2013) make the list of included primary studies available, either directly on the paper or through an online resource (e.g., a companion site for the paper, or a more detailed technical report). Nine secondary studies explicitly assess the quality of the primary studies they include.…”
Section: Quality Evaluation Of Secondary Studiesmentioning
confidence: 99%
“…Yet, there is still a big gap before making Mds more easily applicable, and adoptable by industry. In our recent systematic review of Mds [7], the results have shown that there is a lack of approaches dealing with multiple security concerns at the same time. Most current Mds approaches have not extensively dealt with multiple security concerns but rather a specific one, e.g.…”
Section: Introductionmentioning
confidence: 98%
“…Different MDS approaches can be found in [11]. This section briefly presents the closest related work only.…”
Section: Related Workmentioning
confidence: 99%
“…Our recent systematic review of MDS [11] shows that multiple security concerns have not been addressed systematically by existing MDS studies. Indeed, the interrelations or dependencies among security solutions have not been considered systematically by current MDS approaches.…”
Section: Introductionmentioning
confidence: 99%