Proceedings of the 28th International Conference on Software Engineering 2006
DOI: 10.1145/1134285.1134423
|View full text |Cite
|
Sign up to set email alerts
|

Tools for model-based security engineering

Abstract: We present tool-support for checking UML models and C code against security requirements. A framework supports implementing verification routines, based on XMI output of the diagrams from UML CASE tools, and on control flow generated from the C code. The tool also supports weaving security aspects into the code generated from the models. Advanced users can use this open-source framework to implement verification routines for the constraints of selfdefined security requirements. We focus on a verification routi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Configurations for authentication and access control policy are discussed in [11][12] [13]. Reference [14] describes a security extension of UML for a distributed environment system, and they evaluated their approach. Reference [15] applies Model-Driven Development to security configuration for Web Services, but their target is a configuration for RBAC, which is different from our WS-Security configuration.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Configurations for authentication and access control policy are discussed in [11][12] [13]. Reference [14] describes a security extension of UML for a distributed environment system, and they evaluated their approach. Reference [15] applies Model-Driven Development to security configuration for Web Services, but their target is a configuration for RBAC, which is different from our WS-Security configuration.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…However, steps (4) to (7) can be fully automated and are thus repeatable, given that the specifications from (1) to (3) are established manually. The time and effort spent on steps (1) to (3) can be considered as an overhead to the normal software development process, while steps (4) to (7) save the effort to accommodate changes in the evolving system.…”
Section: A Brief Overview Of the Approachmentioning
confidence: 99%
“…In this approach, recurring security requirements (such as secrecy, integrity, authentication and others) and security assumptions on the system environment, can be specified either within a UML specification (using the UML extension UMLsec [1]), or within the source code (Java or C) as annotations. One can then formally analyse the UMLsec models against the security requirements using the UMLsec tool suite which makes use of model checkers and automated theorem provers for first-order logic (see Figure 2 and [3,4]). The approach has been used successfully in a number of industrial applications (e.g., at BMW [5] and O 2 (Germany) [6]).…”
Section: Introductionmentioning
confidence: 99%
“…One can find these models being used in the requirements phase (i.e. the DDP tool described below), design refactoring using patterns [25], software integration [18], model-based security [40], and performance assessment [6]. Many researchers have proposed support environments to help explore the increasingly complex models that engineers are developing.…”
Section: Requirements Analysis Toolsmentioning
confidence: 99%