A Model Driven Method for Multilevel Security Systems Design

被引:0
|
作者
Zielinski, Zbigniew [1 ]
Stasiak, Andrzej [1 ]
Dabrowski, Wlodzimierz [2 ,3 ]
机构
[1] Mil Univ Technol, PL-00908 Warsaw, Poland
[2] Warsaw Inst Technol, ISEP, Warsaw, Poland
[3] Polish Japanese Inst Informat Technol, PL-00662 Warsaw, Poland
来源
PRZEGLAD ELEKTROTECHNICZNY | 2012年 / 88卷 / 02期
关键词
multilevel security systems; system modeling; UML models simulation; configuration topology;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The article presents the application of methods of simulation of UML models for analysis and designing specialized computer systems, processing data with multilevel security. The integration of security models with models of system described in UML enables their simulation, which allows identifying security problems at the stage of modeling. By using UML extensions and ALF language it is possible to build a topological model and perform efficient simulations of topological models. The authors used an IBM simulator for simulation.
引用
收藏
页码:120 / 125
页数:6
相关论文
共 50 条
  • [41] A MODEL FOR MULTILEVEL SECURITY IN COMPUTER-NETWORKS
    LU, WP
    SUNDARESHAN, MK
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (06) : 647 - 659
  • [42] Model-driven MOE method for weapon systems
    Wei, Hailong
    Li, Qing
    Huang, Shisheng
    Xu, Zhiyong
    Pu, Yudi
    Yang, Shaobo
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (11): : 925 - 933
  • [43] A multilevel security model based on time limit
    Fan, Yanfang
    Han, Zhen
    Cao, Xianggang
    He, Yongzhong
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (03): : 508 - 514
  • [44] The Instance-Based Multilevel Security Model
    Parsons, Jeffrey
    Su, Jianmin
    [J]. GLOBAL PERSPECTIVES ON DESIGN SCIENCE RESEARCH, 2010, 6105 : 365 - +
  • [45] Multilevel Monte Carlo Method for Statistical Model Checking of Hybrid Systems
    Soudjani, Sadegh Esmaeil Zadeh
    Majumdar, Rupak
    Nagapetyan, Tigran
    [J]. QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2017), 2017, 10503 : 351 - 367
  • [46] A MODEL-DRIVEN SYSTEMS DEVELOPMENT METHOD FOR MANAGEMENT INFORMATION SYSTEMS
    Matsumoto, Keinosuke
    Mizuno, Tomoki
    Mori, Naoki
    [J]. KEOD 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND ONTOLOGY DEVELOPMENT, 2010, : 10 - 16
  • [47] A design method of EV charging security early warning model
    Li, Peng-cheng
    Zhao, Yuan-liang
    Yang, Jing
    Xu, Rui
    Zhang, Qiu-yan
    Ying, Li-yun
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 9326 - 9330
  • [48] MODEL OF RECOVERABILITY IN MULTILEVEL SYSTEMS
    ANDERSON, T
    LEE, PA
    SHRIVASTAVA, SK
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1978, 4 (06) : 486 - 494
  • [49] Model-Driven Security Analysis of Self-Sovereign Identity Systems
    Ding, Yepeng
    Sato, Hiroyuki
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1687 - 1694
  • [50] System-of-PUFs: Multilevel Security for Embedded Systems
    Konigsmark, S. T. Choden
    Hwang, Leslie K.
    Chen, Deming
    Wong, Martin D. F.
    [J]. 2014 INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN AND SYSTEM SYNTHESIS (CODES+ISSS), 2014,