2013
DOI: 10.1007/978-3-642-35887-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Model Driven Security through Pattern Refinement Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…However, existing approaches using patterns often target one stage of development (architecture, design or implementation) due to the lack of formalisms ensuring (1) the specification of a pattern at different levels of abstraction, (2) relationships that govern their interactions and complementarity and (3) the relationship between patterns and other artifacts manipulated during the development lifecycle and those related to the assessment of critical systems. Several approaches exist in the security design pattern literature ( Cheng et al, 2003;Fernandez et al, 2011;Giacomo et al, 2008;Hatebur et al, 2007;Jürjens et al, 2002;Katt et al, 2013;Schumacher, 2003 ). They allow solutions to very general problems that appear frequently as sub-tasks in the design of systems with security and dependability requirements.…”
Section: Related Workmentioning
confidence: 99%
“…However, existing approaches using patterns often target one stage of development (architecture, design or implementation) due to the lack of formalisms ensuring (1) the specification of a pattern at different levels of abstraction, (2) relationships that govern their interactions and complementarity and (3) the relationship between patterns and other artifacts manipulated during the development lifecycle and those related to the assessment of critical systems. Several approaches exist in the security design pattern literature ( Cheng et al, 2003;Fernandez et al, 2011;Giacomo et al, 2008;Hatebur et al, 2007;Jürjens et al, 2002;Katt et al, 2013;Schumacher, 2003 ). They allow solutions to very general problems that appear frequently as sub-tasks in the design of systems with security and dependability requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Some research addresses linking the model to the code level within model-based security through modeldriven reverse engineering [34], [35]. Other work addresses the model-based use of security patterns [36], [37]. Further research makes use of aspect-oriented modeling for modelbased security [38].…”
Section: Related Workmentioning
confidence: 99%
“…Model-driven security (MDS) is often used to adapt security dynamically following different approaches: UMLSec (UML for secure systems) [ 32 ], SecureUML (access control language based on UML) [ 33 ], OpenPMF (Open Policy Management Framework) [ 34 , 35 ], SECTET (framework for model-driven security) [ 36 ], etc . For instance, in [ 37 ], models@runtime is used to keep an architectural model synchronized with a policy, but this approach only supports access control policies and not any kind of security functionality, as does our security adaptation service.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, in [ 37 ], models@runtime is used to keep an architectural model synchronized with a policy, but this approach only supports access control policies and not any kind of security functionality, as does our security adaptation service. This is a general limitation in many security policy-based approaches, because they are primarily focused only on access control or authorization concerns [ 34 , 35 , 38 , 39 ] or they are focused only on a specific domain, such as mobile cloud [ 40 ] or service-oriented architecture (SOA) [ 34 36 , 38 ].…”
Section: Related Workmentioning
confidence: 99%