Guiding the selection of security patterns for real-time systems

被引:0
|
作者
Motii, Anas [1 ]
Hamid, Brahim [2 ]
Lanusse, Agnes [1 ]
Bruel, Jean-Michel [2 ]
机构
[1] CEA, LIST, Lab Model Driven Engn Embedded Syst, PC 174, F-91191 Gif Sur Yvette, France
[2] Univ Toulouse, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
关键词
Real-time; Security patterns; Schedulability analysis; Model-Driven Engineering (MDE);
D O I
10.1109/ICECCS.2016.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially when it comes to critical transmitted data in a real-time environment. At the same time, the implementation of security counter-measures in such systems may impact transmission delays of critical tasks. For this reason selecting proper security mechanisms in such critical systems is an important issue. In this context, we propose a model-based approach for selecting proper security solution alternatives composed of security patterns at early design stage against real-time requirements. We provide a generalizable and tool-supported solution to support the approach using UML and its profiles. A validation of the work is presented via a simplified version of SCADA (Supervisory Control and Data Acquisition) system case study.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [1] Safe Design Real-time Embedded Systems with Security Patterns
    Ben Mansour, Ahmed
    Naija, Mohamed
    Ben Ahmed, Samir
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE), 2019, : 459 - 463
  • [2] SoK: Security in Real-Time Systems
    Hasan, Monowar
    Kashinath, Ashish
    Chen, Chien-Ying
    Mohan, Sibin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (09)
  • [3] Observer Patterns for Real-Time Systems
    Andre, Etienne
    [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 125 - 134
  • [4] Security Issues in Industrial Real-Time Systems
    Al-Jarad, Talhah
    Al Madani, Basem
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 357 - 361
  • [5] Static Security Optimization for Real-Time Systems
    Lin, Man
    Xu, Li
    Yang, Laurence T.
    Qin, Xiao
    Zheng, Nenggan
    Wu, Zhaohui
    Qiu, Meikang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (01) : 22 - 37
  • [6] Guiding the selection of security patterns based on security requirements and pattern classification
    Motii, Anas
    Hamid, Brahim
    Lanusse, Agnes
    Bruel, Jean-Michel
    [J]. PROCEEDINGS OF THE 20TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2015), 2015,
  • [7] Supporting timeliness and security in real-time database systems
    Son, SH
    [J]. NINTH EUROMICRO WORKSHOP ON REAL TIME SYSTEMS, PROCEEDINGS, 1997, : 266 - 273
  • [8] Real-Time Systems Security Through Scheduler Constraints
    Mohan, Sibin
    Yoon, Man-Ki
    Pellizzoni, Rodolfo
    Bobba, Rakesh
    [J]. 2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, : 129 - +
  • [9] Schedulability driven security optimization in real-time systems
    Lin, Man
    Yang, Laurence T.
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 314 - +
  • [10] Modelling security risks in real-time operating systems
    Kiszka, Jan
    Wagner, Bernardo
    [J]. 2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130