2002
DOI: 10.1007/3-540-45800-x_33
|View full text |Cite
|
Sign up to set email alerts
|

SecureUML: A UML-Based Modeling Language for Model-Driven Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
327
0
4

Year Published

2003
2003
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 520 publications
(355 citation statements)
references
References 5 publications
2
327
0
4
Order By: Relevance
“…Secure TROPOS [44] as extension of the i* modeling language is one example of such methods. Furthermore, two extensions of UML, namely UMLSec [45] and Secure UML [46] were introduced as a possible way to improve the integration of security-specific information into UML. 7 Some of the analysis-oriented methods utilized for SRE can also be applied for security architecture reviews, since the goal to reveal threats, weaknesses, and vulnerabilities remains the same for both.…”
Section: Sre Methodsmentioning
confidence: 99%
“…Secure TROPOS [44] as extension of the i* modeling language is one example of such methods. Furthermore, two extensions of UML, namely UMLSec [45] and Secure UML [46] were introduced as a possible way to improve the integration of security-specific information into UML. 7 Some of the analysis-oriented methods utilized for SRE can also be applied for security architecture reviews, since the goal to reveal threats, weaknesses, and vulnerabilities remains the same for both.…”
Section: Sre Methodsmentioning
confidence: 99%
“…There is a plethora of works in the context of security modeling with UML such as [18,19,29]. As indicated above, the USE system is a general-purpose validation tool and can hence be employed for other UML/OCL encodings of RBAC policies than that given in Section 4.…”
Section: Related Workmentioning
confidence: 99%
“…As indicated above, the USE system is a general-purpose validation tool and can hence be employed for other UML/OCL encodings of RBAC policies than that given in Section 4. In particular, Lodderstedt et al present the modeling language SecureUML for integrating the specification of access control into application models and automatic generation of access control infrastructures for applications [18]. They also deal with authorization constraints, but do not concentrate on SoD constraints.…”
Section: Related Workmentioning
confidence: 99%
“…He proposes a concept for specifying requirements on confidentiality and integrity in analysis models based on UML. Lodderstedt et al [42] present a UML-based modelling language (SecureUML). Their approach is focused on modelling access control policies and integrating them into a model-driven software development process.…”
Section: Security Requirements Engineering: a Surveymentioning
confidence: 99%