2014
DOI: 10.1016/j.csi.2013.12.011
|View full text |Cite
|
Sign up to set email alerts
|

Specifying model changes with UMLchange to support security verification of potential evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…A research effort was conducted thereafter to define frameworks for the systematic application of MDD approaches [33], independently of the notations and the processes adopted. More recently, MDD approaches were introduced to extend the targeted NFRs (e.g., to guarantee security during software evolution [34]), to cope with specific paradigms (such as Service-Oriented Architectures [35]) and/or specific application domains (such as Adaptive Systems [36]) and to control the fulfilment of NFRs in model transformations [37].…”
Section: Non-functional Requirements In Mddmentioning
confidence: 99%
“…A research effort was conducted thereafter to define frameworks for the systematic application of MDD approaches [33], independently of the notations and the processes adopted. More recently, MDD approaches were introduced to extend the targeted NFRs (e.g., to guarantee security during software evolution [34]), to cope with specific paradigms (such as Service-Oriented Architectures [35]) and/or specific application domains (such as Adaptive Systems [36]) and to control the fulfilment of NFRs in model transformations [37].…”
Section: Non-functional Requirements In Mddmentioning
confidence: 99%
“…We experimented it on XML diff algorithms and this analysis has not required us to do any modification or extension to the model. The generality of UniDM and our first experiments make us optimistic about the possibility of extending and tuning the metrics to evaluate diff algorithms specialized, for instance, on database dumps [13], ontologies [8] or diagrams [28]. This is one of the main future directions of our research.…”
Section: Discussionmentioning
confidence: 94%
“…To further demonstrate our quality framework's applicability to other methodologies—and hence the generalizability of our validation—below we consider very briefly some unique activities and features of two methodologies: UMLsec/MBSE and Secure Tropos . In particular: UMLsec's and Secure Tropos' security modeling activities—even to the level of specific constructs such as constraints, goals, and others—can be assessed by our quality framework via instances and subsequent specializations of Structure (artifacts) (CF; w; O) and Structure (activities — introducing countermeasures) (SP; w; S) , as well as via other artifact‐related criteria.…”
Section: On the Generalizability Of Our Validation To Other Methodolomentioning
confidence: 95%
“…The UMLsec modeling language is used to capture security constraints at the design level (security modeling), and also offers the ability to model and verify security protocols. More recently, UMLsec has also incorporated ideas and corresponding software tools for change management and privacy concerns …”
Section: On the Generalizability Of Our Validation To Other Methodolomentioning
confidence: 99%