2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom) 2012
DOI: 10.1109/biomedcom.2012.25
|View full text |Cite
|
Sign up to set email alerts
|

Security Engineering and Modelling of Set-Top Boxes

Abstract: This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the process and its secure artefacts, models what we call a Domain Security Metamodel that defines all the security properties of that domain and implements them using Security Building Blocks. This security artefact can be used by system engineers when modelling their syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…As design case tools the specific UML profiles are used in the industry, holding relevant embedded security peculiarities, particular requirements, vulnerabilities, security components and their properties and connections between them. In particular in [28,29,31] Domain Specific Models are introduced to model and analyze security mechanisms for systems with embedded devices. In essence each domain is oriented to representation of the device or the whole system in the context of some particular security feature, such as secure storage domain, secure communication domain, user authentication one, etc.…”
Section: Related Workmentioning
confidence: 99%
“…As design case tools the specific UML profiles are used in the industry, holding relevant embedded security peculiarities, particular requirements, vulnerabilities, security components and their properties and connections between them. In particular in [28,29,31] Domain Specific Models are introduced to model and analyze security mechanisms for systems with embedded devices. In essence each domain is oriented to representation of the device or the whole system in the context of some particular security feature, such as secure storage domain, secure communication domain, user authentication one, etc.…”
Section: Related Workmentioning
confidence: 99%