2012
DOI: 10.1007/978-3-642-35362-8_22
|View full text |Cite
|
Sign up to set email alerts
|

MDSE@R: Model-Driven Security Engineering at Runtime

Abstract: New security threats arise frequently and impact on enterprise software security requirements. However, most existing security engineering approaches focus on capturing and enforcing security requirements at design time. Many do not address how a system should be adapted to cope with new unanticipated security requirements that arise at runtime. We describe a new approach -Model Driven Security Engineering at Runtime (MDSE@R)enabling security engineers to dynamically specify and enforce system security require… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…During runtime, enforcement of policies such as described by MDSE@R [22] becomes important. Although runtime is not in the scope of this work, we can exploit our iObserve approach [23] in order to update design time models by observations during runtime to make use of the analysis proposed in this paper based on architectural runtime models.…”
Section: State Of the Artmentioning
confidence: 99%
“…During runtime, enforcement of policies such as described by MDSE@R [22] becomes important. Although runtime is not in the scope of this work, we can exploit our iObserve approach [23] in order to update design time models by observations during runtime to make use of the analysis proposed in this paper based on architectural runtime models.…”
Section: State Of the Artmentioning
confidence: 99%
“…In addition, they don't treat the problem of the encryption of the association between multidimensional concepts. References [7,8] presented an adaptable security and model-based security, but authors don't deal with the problem of how to secure a CDW. In addition, the problem of how to adapt the security solution of CDW when the cloud server provider is changed is not treated.…”
Section: Discussionmentioning
confidence: 99%
“…Similar to our approach, in [7,8], the authors presented a model-driven security engineering approach for multi-tenant SaaS applications. This approach is based on externalizing security from the underlying SaaS application, which allows both service and security to evolve at runtime.…”
Section: B Adaptive Securitymentioning
confidence: 90%