2010
DOI: 10.1093/comjnl/bxq042
|View full text |Cite
|
Sign up to set email alerts
|

Run-Time Security Traceability for Evolving Systems

Abstract: Security-critical systems are challenging to design and implement correctly and securely. A lot of vulnerabilities have been found in current software systems both at the specification and the implementation levels. This paper presents a comprehensive approach for model-based security assurance. Initially, it allows one to formally verify the design models against high-level security requirements such as secrecy and authentication on the specification level, and helps to ensure that their implementation adhere… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 65 publications
(91 reference statements)
0
2
0
Order By: Relevance
“…Bauer et al [69] propose an approach for model-based security assurance that supports security verification at both levels: design and implementation. At the specification level, the design models are verified formally against high-level security requirements such as secrecy and authentication.…”
Section: Verification Of Security Requirementsmentioning
confidence: 99%
“…Bauer et al [69] propose an approach for model-based security assurance that supports security verification at both levels: design and implementation. At the specification level, the design models are verified formally against high-level security requirements such as secrecy and authentication.…”
Section: Verification Of Security Requirementsmentioning
confidence: 99%
“…Accordingly, this survey is oriented towards symbolic models, and just mentions the first attempts made in the direction of computational models [BCFZ08,BMU10,FKS11,KTG12]. There is still another approach that has been investigated by some researchers as a means for ensuring or verifying the correspondence between an abstract security protocol model and its implementation: runtime verification [Jür05,JYB08,PJ10,BJ10,BJY11]. According to this approach, the protocol model is formal and proved correct.…”
Section: Previewmentioning
confidence: 99%