2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.66
|View full text |Cite
|
Sign up to set email alerts
|

Toward the Engineering of Security of Information Systems (ESIS): UML and the IS Confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Another group of approaches like (Alghathbar and Wijesekera, 2003;Lodderstedt et al, 2002;Goudalo and Seret, 2008) aim for extending UML with security information. Some allow modelling ACRs on the architectural level.…”
Section: State Of the Artmentioning
confidence: 99%
“…Another group of approaches like (Alghathbar and Wijesekera, 2003;Lodderstedt et al, 2002;Goudalo and Seret, 2008) aim for extending UML with security information. Some allow modelling ACRs on the architectural level.…”
Section: State Of the Artmentioning
confidence: 99%
“…We base the actions of this step on various experiments both in industry and academic research. As mentioned in section 3.3, Goudalo defined seven security acts constituting the engineering of information security (Goudalo, 2011). Although several researchers have discussed usable security design, Kai-Ping Yee has proposed a list of guidelines for addressing valid and nontrivial problems specific to usable security design (Yee, 2002): path of least resistance, active authorization, revocability, visibility, self-awareness, trusted path, expressiveness, relevant boundaries, identifiability and foresight.…”
Section: Stage #3: Define Solutionsmentioning
confidence: 99%
“…They defined the security stereotypes based on the Open Web Application Security Project, which lists the top ten most critical web application vulnerabilities, including buffer overflow, connection flooding, encryption, access control, and Search and Query Language injection. Goudalo and Seret worked on the security of information systems (ISs) and proposed another UML profile with secrecy, trust, and role‐based access control stereotypes. Villarroel et al .…”
Section: Related Workmentioning
confidence: 99%