Model-based security engineering with UML

被引:0
|
作者
Jürjens, J [1 ]
机构
[1] Tech Univ Munich, Dept Informat, D-8000 Munich, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Developing security-critical systems is difficult and there are many well-known examples of security weaknesses exploited in practice. Thus a sound methodology supporting secure systems development is urgently needed. Our aim is to aid the difficult task of developing security-critical systems in a formally based approach using the notation of the Unified Modeling Language. We present the extension UMLsec of UML that allows one to express security-relevant information within the diagrams in a system specification. UMLsec is defined in form of a UML profile using the standard UML extension mechanisms. In particular, the associated constraints give criteria to evaluate the security aspects of a system design, by referring to a formal semantics of a simplified fragment of UML. We explain how these constraints can be formally verified against the dynamic behavior of the specification using automated theorem provers for first-order logic. This formal security verification can also be extended to C code generated from the specifications.
引用
收藏
页码:42 / 77
页数:36
相关论文
共 50 条
  • [1] Model-based security engineering with UML:: Introducing security aspects
    Juerjens, Jan
    [J]. FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2006, 4111 : 64 - 87
  • [2] Sound methods and effective tools for model-based security engineering with UML
    Jürjens, J
    [J]. ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 322 - 331
  • [3] Model-based security engineering
    Juerjens, Jan
    [J]. ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS23 - IS29
  • [4] Model-based security engineering
    Juerjens, Jan
    [J]. SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS23 - IS29
  • [5] Model-based security engineering
    Juerjens, Jan
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS23 - IS29
  • [6] Model-based security engineering
    Juerjens, Jan
    [J]. WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS23 - IS29
  • [7] Model-based security engineering for real
    Juerjens, Jan
    [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 600 - 606
  • [8] WorSE: A Workbench for Model-based Security Engineering
    Amthor, Peter
    Kuehnhauser, Winfried E.
    Poelck, Anja
    [J]. COMPUTERS & SECURITY, 2014, 42 : 40 - 55
  • [9] Security & Safety by Model-based Requirements Engineering
    Japs, Sergej
    [J]. 2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 422 - 427
  • [10] MoMuT::UML Model-based Mutation Testing for UML
    Aichernig, Bernhard
    Brandl, Harald
    Joebstl, Elisabeth
    Krenn, Willibald
    Schlick, Rupert
    Tiran, Stefan
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2015,