Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems 2010
DOI: 10.1145/2401736.2401741
|View full text |Cite
|
Sign up to set email alerts
|

Modelling and analysing resilience as a security issue within UML

Abstract: Modelling system security is not common practise in software projects yet. Among other problems, there is not a widely accepted methodology which unifies the actual heterogeneity of security issues when addressing a whole security specification. Certainly, the reality is even worse since there is not an accepted or standard common notation for carrying out the security specification. In this work, we study how modelling security issues, specifically resilience, could be integrated in the MARTE-DAM framework, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…SecAM [20,3] is an UML profile designed for the security analysis and mod-elling of software systems. It allows attack/resilience, cryptography, security mechanisms, and access control issues to be expressed within UML models.…”
Section: The Secam Profile and Generalized Stochastic Petri Netsmentioning
confidence: 99%
See 2 more Smart Citations
“…SecAM [20,3] is an UML profile designed for the security analysis and mod-elling of software systems. It allows attack/resilience, cryptography, security mechanisms, and access control issues to be expressed within UML models.…”
Section: The Secam Profile and Generalized Stochastic Petri Netsmentioning
confidence: 99%
“…This equipment is normally used by maintainers and other authorised 20 personnel, but can be potentially targeted by unauthorised personnel through the same physical access points. Since trackside shelters and technical rooms are nowadays equipped with physical security and environmental monitoring devices, security threat analysis can be advantageously fed with both physical and logical elements [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It enables the specification in UML behavioural diagrams of attacks, vulnerabilities and intrusion concepts, and also their causal relationships (i.e., the attack-vulnerability-intrusion or AVI chain) [12]. The package was initially proposed in [13] to conduct a vulnerability stochastic analysis. Figure 2 details the package.…”
Section: Secam::resilience Packagementioning
confidence: 99%
“…On the other hand, since we focus our work in the context of intrusion-tolerant systems (i.e., those critical systems which apply FT techniques to tolerate intrusions), this implies also the necessity to report security requirements in the same UML designs. So, to avoid greater complexities, we rely on SecAM [8] (Security Analysis and Modelling profile), which is properly integrated in the MARTE-DAM framework. Although it may seem that the use of these profiles may bring some knottiness, in reality, a little part of the stereotypes proposed by the above mentioned profiles greatly helps designers of critical systems in their work.…”
Section: Introductionmentioning
confidence: 99%