Guiding the selection of security patterns for real-time systems

被引:0
|
作者
Motii, Anas [1 ]
Hamid, Brahim [2 ]
Lanusse, Agnes [1 ]
Bruel, Jean-Michel [2 ]
机构
[1] CEA, LIST, Lab Model Driven Engn Embedded Syst, PC 174, F-91191 Gif Sur Yvette, France
[2] Univ Toulouse, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
关键词
Real-time; Security patterns; Schedulability analysis; Model-Driven Engineering (MDE);
D O I
10.1109/ICECCS.2016.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially when it comes to critical transmitted data in a real-time environment. At the same time, the implementation of security counter-measures in such systems may impact transmission delays of critical tasks. For this reason selecting proper security mechanisms in such critical systems is an important issue. In this context, we propose a model-based approach for selecting proper security solution alternatives composed of security patterns at early design stage against real-time requirements. We provide a generalizable and tool-supported solution to support the approach using UML and its profiles. A validation of the work is presented via a simplified version of SCADA (Supervisory Control and Data Acquisition) system case study.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [21] Formal patterns for multirate distributed real-time systems
    Bae, Kyungmin
    Meseguer, Jose
    Olveczky, Peter Csaba
    SCIENCE OF COMPUTER PROGRAMMING, 2014, 91 : 3 - 44
  • [22] Monitoring Arbitrary Activation Patterns in Real-Time Systems
    Neukirchner, Moritz
    Michaels, Tobias
    Axer, Philip
    Quinton, Sophie
    Ernst, Rolf
    PROCEEDINGS OF THE 2012 IEEE 33RD REAL-TIME SYSTEMS SYMPOSIUM (RTSS), 2012, : 293 - 302
  • [23] AUTOMATIC CONTINGENCY SELECTION FOR ONLINE SECURITY ANALYSIS - REAL-TIME TESTS
    SASSON, AM
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (05): : 1552 - 1559
  • [24] Real-time selection of glycopeptide dissociation methods by matching oxonium patterns using a real-time library search
    Riley, Nicholas M.
    Barshop, William
    McAlister, Graeme
    Syka, John E. P.
    Canterbury, Jesse
    Mullen, Christopher
    Bergen, David
    Huguet, Romain
    Bertozzi, Carolyn R.
    GLYCOBIOLOGY, 2021, 31 (12) : 1719 - 1720
  • [25] Design of Adaptive Security Mechanisms for Real-Time Embedded Systems
    Saadatmand, Mehrdad
    Cicchetti, Antonio
    Sjodin, Mikael
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 121 - 134
  • [26] Circuits and systems for real-time security and copyright protection of multimedia
    Mohanty, Saraju P.
    Memon, Nasir
    Chatha, Kararn S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) : 231 - 234
  • [27] Integrating fault recovery and quality of security in real-time systems
    Bellam, Kiranmai
    Zong, Ziliang
    Alghamdi, Mohammed. I.
    Nijim, Mais
    Qin, Xiao
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 500 - +
  • [28] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [29] Maintaining integrity constraints and security in real-time database systems
    Ahmed, QN
    Vrbsky, SV
    INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS, 1998, : 255 - 269
  • [30] Systematic security and timeliness tradeoffs in real-time embedded systems
    Kang, Kyoung-Don
    Son, Sang H.
    12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 183 - +