2009
DOI: 10.5381/jot.2009.8.6.a1
|View full text |Cite
|
Sign up to set email alerts
|

Usability of Security Specification Approaches for UML Design: A Survey.

Abstract: Since it is the de facto language for software specification and design, UML is the target language used by almost all state of the art contributions handling security at specification and design level. However, these contributions differ in the covered security requirements, specification approaches, verification tools, etc. This paper investigates the main approaches adopted for specifying and enforcing security at UML design and surveys the related state of the art. The main contribution of this paper is a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…This summary would highlight the application of Features in representing the characteristics and properties of the Access control model taken for representing the ACPs of an application. [30] and [31] , that defines the following technical criteria is used for analysis. Certain criteria are newly proposed in this paper that would enhance the qualitative analysis.…”
Section: 7 B Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This summary would highlight the application of Features in representing the characteristics and properties of the Access control model taken for representing the ACPs of an application. [30] and [31] , that defines the following technical criteria is used for analysis. Certain criteria are newly proposed in this paper that would enhance the qualitative analysis.…”
Section: 7 B Discussionmentioning
confidence: 99%
“…4 1 B Factors that focus on representation of ACPs-Applicability 1. Expressiveness [31]: Refers to the ability of representing security policies as models. This is an important criterion that would make the modeling approach successful.…”
Section: 7 B Discussionmentioning
confidence: 99%
“…We don't know of any other paper surveying and analyzing RBAC supported techniques with similar criteria as ours. Another survey of security design techniques [27] employs different criteria such as expressitivity, tool support, verifiability and complexity but does not focus on RBAC. However, a paper [28] have discussed the formalisms and methods for the validation of RBAC policies.…”
Section: A a Summary Of Formal Techniquesmentioning
confidence: 99%
“…For the SeMF approach, the first implementation has been based on ArgoUML and utilized UML Profiles for usability reasons (cf. [39]) in order to provide a graphical representation [40]. However, this implementation displayed a couple of drawbacks:…”
Section: Development Approach and Implementationmentioning
confidence: 99%