Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications
Identifieur interne : 000908 ( Main/Exploration ); précédent : 000907; suivant : 000909Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications
Auteurs : Jan Jürjens [Allemagne] ; Martín Ochoa [Allemagne] ; Holger Schmidt [Allemagne] ; Loïc Marchal [Belgique] ; Siv Hilde Houmb [Norvège] ; Shareeful Islam [Royaume-Uni]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2011.
Abstract
Abstract: Developing security-critical systems is difficult, and there are many well-known examples of vulnerabilities exploited in practice. In fact, there has recently been a lot of work on methods, techniques, and tools to improve this situation already at the system specification and design. However, security-critical systems are increasingly long-living and undergo evolution throughout their lifetime. Therefore, a secure software development approach that supports maintaining the needed levels of security even through later software evolution is highly desirable. In this chapter, we recall the UMLsec approach to model-based security and discuss on tools and techniques to model and verify evolution of UMLsec models.
Url:
DOI: 10.1007/978-3-642-21455-4_15
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 001044
- to stream Istex, to step Curation: 001044
- to stream Istex, to step Checkpoint: 000220
- to stream Main, to step Merge: 000908
- to stream Main, to step Curation: 000908
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications</title>
<author><name sortKey="Jurjens, Jan" sort="Jurjens, Jan" uniqKey="Jurjens J" first="Jan" last="Jürjens">Jan Jürjens</name>
</author>
<author><name sortKey="Ochoa, Martin" sort="Ochoa, Martin" uniqKey="Ochoa M" first="Martín" last="Ochoa">Martín Ochoa</name>
</author>
<author><name sortKey="Schmidt, Holger" sort="Schmidt, Holger" uniqKey="Schmidt H" first="Holger" last="Schmidt">Holger Schmidt</name>
</author>
<author><name sortKey="Marchal, Loic" sort="Marchal, Loic" uniqKey="Marchal L" first="Loïc" last="Marchal">Loïc Marchal</name>
</author>
<author><name sortKey="Houmb, Siv Hilde" sort="Houmb, Siv Hilde" uniqKey="Houmb S" first="Siv Hilde" last="Houmb">Siv Hilde Houmb</name>
</author>
<author><name sortKey="Islam, Shareeful" sort="Islam, Shareeful" uniqKey="Islam S" first="Shareeful" last="Islam">Shareeful Islam</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:D85A56FAB0D3B719F9BF2981EEFB6154D730A318</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1007/978-3-642-21455-4_15</idno>
<idno type="url">https://api.istex.fr/document/D85A56FAB0D3B719F9BF2981EEFB6154D730A318/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001044</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001044</idno>
<idno type="wicri:Area/Istex/Curation">001044</idno>
<idno type="wicri:Area/Istex/Checkpoint">000220</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000220</idno>
<idno type="wicri:doubleKey">0302-9743:2011:Jurjens J:modelling:secure:systems</idno>
<idno type="wicri:Area/Main/Merge">000908</idno>
<idno type="wicri:Area/Main/Curation">000908</idno>
<idno type="wicri:Area/Main/Exploration">000908</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications</title>
<author><name sortKey="Jurjens, Jan" sort="Jurjens, Jan" uniqKey="Jurjens J" first="Jan" last="Jürjens">Jan Jürjens</name>
<affiliation wicri:level="1"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Software Engineering, Dep. of Computer Science, TU Dortmund</wicri:regionArea>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Fraunhofer ISST</wicri:regionArea>
</affiliation>
</author>
<author><name sortKey="Ochoa, Martin" sort="Ochoa, Martin" uniqKey="Ochoa M" first="Martín" last="Ochoa">Martín Ochoa</name>
<affiliation wicri:level="1"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Software Engineering, Dep. of Computer Science, TU Dortmund</wicri:regionArea>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Schmidt, Holger" sort="Schmidt, Holger" uniqKey="Schmidt H" first="Holger" last="Schmidt">Holger Schmidt</name>
<affiliation wicri:level="1"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Software Engineering, Dep. of Computer Science, TU Dortmund</wicri:regionArea>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
<wicri:noRegion>TU Dortmund</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Marchal, Loic" sort="Marchal, Loic" uniqKey="Marchal L" first="Loïc" last="Marchal">Loïc Marchal</name>
<affiliation wicri:level="1"><country xml:lang="fr">Belgique</country>
<wicri:regionArea>Hermès Engineering</wicri:regionArea>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Houmb, Siv Hilde" sort="Houmb, Siv Hilde" uniqKey="Houmb S" first="Siv Hilde" last="Houmb">Siv Hilde Houmb</name>
<affiliation wicri:level="1"><country xml:lang="fr">Norvège</country>
<wicri:regionArea>Secure-NOK AS</wicri:regionArea>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Islam, Shareeful" sort="Islam, Shareeful" uniqKey="Islam S" first="Shareeful" last="Islam">Shareeful Islam</name>
<affiliation wicri:level="1"><country xml:lang="fr">Royaume-Uni</country>
<wicri:regionArea>School of Computing, IT and Engineering, University of East London</wicri:regionArea>
<wicri:noRegion>University of East London</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2011</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">D85A56FAB0D3B719F9BF2981EEFB6154D730A318</idno>
<idno type="DOI">10.1007/978-3-642-21455-4_15</idno>
<idno type="ChapterID">15</idno>
<idno type="ChapterID">Chap15</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Developing security-critical systems is difficult, and there are many well-known examples of vulnerabilities exploited in practice. In fact, there has recently been a lot of work on methods, techniques, and tools to improve this situation already at the system specification and design. However, security-critical systems are increasingly long-living and undergo evolution throughout their lifetime. Therefore, a secure software development approach that supports maintaining the needed levels of security even through later software evolution is highly desirable. In this chapter, we recall the UMLsec approach to model-based security and discuss on tools and techniques to model and verify evolution of UMLsec models.</div>
</front>
</TEI>
<affiliations><list><country><li>Allemagne</li>
<li>Belgique</li>
<li>Norvège</li>
<li>Royaume-Uni</li>
</country>
</list>
<tree><country name="Allemagne"><noRegion><name sortKey="Jurjens, Jan" sort="Jurjens, Jan" uniqKey="Jurjens J" first="Jan" last="Jürjens">Jan Jürjens</name>
</noRegion>
<name sortKey="Jurjens, Jan" sort="Jurjens, Jan" uniqKey="Jurjens J" first="Jan" last="Jürjens">Jan Jürjens</name>
<name sortKey="Ochoa, Martin" sort="Ochoa, Martin" uniqKey="Ochoa M" first="Martín" last="Ochoa">Martín Ochoa</name>
<name sortKey="Ochoa, Martin" sort="Ochoa, Martin" uniqKey="Ochoa M" first="Martín" last="Ochoa">Martín Ochoa</name>
<name sortKey="Schmidt, Holger" sort="Schmidt, Holger" uniqKey="Schmidt H" first="Holger" last="Schmidt">Holger Schmidt</name>
<name sortKey="Schmidt, Holger" sort="Schmidt, Holger" uniqKey="Schmidt H" first="Holger" last="Schmidt">Holger Schmidt</name>
</country>
<country name="Belgique"><noRegion><name sortKey="Marchal, Loic" sort="Marchal, Loic" uniqKey="Marchal L" first="Loïc" last="Marchal">Loïc Marchal</name>
</noRegion>
</country>
<country name="Norvège"><noRegion><name sortKey="Houmb, Siv Hilde" sort="Houmb, Siv Hilde" uniqKey="Houmb S" first="Siv Hilde" last="Houmb">Siv Hilde Houmb</name>
</noRegion>
</country>
<country name="Royaume-Uni"><noRegion><name sortKey="Islam, Shareeful" sort="Islam, Shareeful" uniqKey="Islam S" first="Shareeful" last="Islam">Shareeful Islam</name>
</noRegion>
<name sortKey="Islam, Shareeful" sort="Islam, Shareeful" uniqKey="Islam S" first="Shareeful" last="Islam">Shareeful Islam</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000908 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000908 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:D85A56FAB0D3B719F9BF2981EEFB6154D730A318 |texte= Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications }}
This area was generated with Dilib version V0.6.31. |