2015
DOI: 10.1007/s00607-015-0445-x
|View full text |Cite
|
Sign up to set email alerts
|

Specification, verification, and quantification of security in model-based systems

Abstract: Modern systems are more and more complex and security has become a key component in the success of software and systems development. The main challenge encountered in industry as well as in academia is to develop secure products, prove their security correctness, measure their resilience to attacks, and check if vulnerabilities exist. In this paper, we review the state-of-the-art related to security specification, verification, and quantification for software and systems that are modeled by using UML or SysML … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 55 publications
0
12
0
Order By: Relevance
“…The model checking approach has 2 main methods including KS and LTS. 66,[91][92][93] Some well-known model checkers are applied to verification approach such as NuSMV, § SPIN, ¶ PAT, # and UPPAAL**. 74,94 The existing model checking methods specify a state space exploration of the system behavior using reachable graph of binary decision diagrams.…”
Section: Model Checking Methods In the Service Composition Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The model checking approach has 2 main methods including KS and LTS. 66,[91][92][93] Some well-known model checkers are applied to verification approach such as NuSMV, § SPIN, ¶ PAT, # and UPPAAL**. 74,94 The existing model checking methods specify a state space exploration of the system behavior using reachable graph of binary decision diagrams.…”
Section: Model Checking Methods In the Service Composition Approachmentioning
confidence: 99%
“…Finally, the technical results, advantages, and disadvantages are compared in Section 4.2.2. The model checking approach has 2 main methods including KS and LTS . Some well‐known model checkers are applied to verification approach such as NuSMV, SPIN, PAT, and UPPAAL .…”
Section: Categorizing Of Selected Service Composition Approachesmentioning
confidence: 99%
“…Model checking is an influential formal verification method to evaluate software systems . Kripke structure (KS) and labeled transition system (LTS) are two main verification methods in the model checking.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Model checking is an influential formal verification method to evaluate software systems. 4,[26][27][28] Kripke structure (KS) and labeled transition system (LTS) are two main verification methods in the model checking. Also, NuSMV, Process Analysis Toolkit (PAT), UPPAAL, and TLA+ are famous model checking tools that evaluate the proposed behavioral models according to specified specification rules using temporal logic.…”
Section: Preliminaries and Backgroundmentioning
confidence: 99%
“…The approach is helpful for understanding and extracting the most beneficial non-functional requirements and providing the base for the better model selection. Ouchani and Debbabi (2015) analyze the state of the art related to security requirement specification of software systems that are modeled upon UML languages the related work is in state of the art for security requirements at different design levels are compared. The approaches used for verification of security requirements include model checking, theorem proving.…”
Section: Literature Reviewmentioning
confidence: 99%