2005
DOI: 10.1007/11526841_20
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform

Abstract: Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed with the analysers of the calculi, and the results of the analysis are reflected back into a modified version of the input UML model. The design platform supporting the methodology, Choreographer, interoperates with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…For instance, HIDE [4] is an environment for the design and transformation-based validation of dependable systems that, however, does not include an explicit mechanism for annotation of results. Another example is DEGAS [5], a framework for the analysis of UML models with annotation of results to UML. The design platform supporting the methodology interoperates with state-of-theart UML modelling tools, playing the role of bridge between these CASE tools and additional ones for the analysis.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, HIDE [4] is an environment for the design and transformation-based validation of dependable systems that, however, does not include an explicit mechanism for annotation of results. Another example is DEGAS [5], a framework for the analysis of UML models with annotation of results to UML. The design platform supporting the methodology interoperates with state-of-theart UML modelling tools, playing the role of bridge between these CASE tools and additional ones for the analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Buchholtz et al [79] verify the security requirements by a qualitative analysis and then compute the performance measure by a performance analysis of UML sequence diagrams. The used technique for security analysis is a static analysis procedure.…”
Section: Security Quantificationmentioning
confidence: 99%
“…It is targeted specifically at efforts to ensure view consistency for tree-structured data, but does not propose a concrete language for transformations and updates, nor has it been applied directly to security analysis. By contrast, the work in the DEGAS project explored security analysis in the context of the Choreographer platform [19], but they did not present a concrete transformation language as well.…”
Section: Model Mergingmentioning
confidence: 99%