Proceedings of the 6th International Workshop on Software and Performance 2007
DOI: 10.1145/1216993.1217010
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of security aspects in UML models

Abstract: The focus of the paper is on the analysis of performance effects of different security solutions modeled as aspects in UML. Aspect oriented modeling (AOM) allows software designers to isolate and separately address solutions for crosscutting concerns, which are defined as distinct UML aspect models, then are composed with the primary UML model of the system under development. For performance analysis we use techniques developed previously in the PUMA project, which take as input UML models annotated with the s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(40 citation statements)
references
References 14 publications
0
40
0
Order By: Relevance
“…Models of crosscutting concerns (called aspects) are woven with system models via an automated process. The application of aspect-oriented modeling to security analysis is considered by Petriu et al [20] and Houmb et al [21]. These approaches differ from the work presented in this paper by focusing more on the development of security artifacts and supporting analysis, rather than being able to reflect the results of analysis in system models.…”
Section: Security Analysismentioning
confidence: 93%
“…Models of crosscutting concerns (called aspects) are woven with system models via an automated process. The application of aspect-oriented modeling to security analysis is considered by Petriu et al [20] and Houmb et al [21]. These approaches differ from the work presented in this paper by focusing more on the development of security artifacts and supporting analysis, rather than being able to reflect the results of analysis in system models.…”
Section: Security Analysismentioning
confidence: 93%
“…In order to transform the already discussed deployment architecture [9] into UML deployment models, we should use the developed UML approach for Access Control Infrastructures analyses in [11] and UML models for information systems performance analyses in [16]. The primary model represents the basic functionality without any security mechanisms.…”
Section: Information Systems Security and Data Protection Model Drivementioning
confidence: 99%
“…The primary model represents the basic functionality without any security mechanisms. The components of a web-system are logically divided into three tiers: a) a set of emulated web browsers (EB), b) web tier including Web Servers, Image Servers and Web Caches and c) persistent storage [16]. Figure 1 presents a general UML deployment diagram of the feasible Information System, investigated in the [9].…”
Section: Information Systems Security and Data Protection Model Drivementioning
confidence: 99%
See 1 more Smart Citation
“…However there is considerable research on recovery block modeling [7][8] [9][13] [14] and AOM application to features like security [10], performance [12][10], access control [11].…”
Section: Related Workmentioning
confidence: 99%