ModelSec: A Generative Architecture for Model-Driven Security

被引:0
|
作者
Sanchez, Oscar [1 ]
Molina, Fernando [1 ]
Garcia-Molina, Jesus [1 ]
Toval, Ambrosio [1 ]
机构
[1] Univ Murcia, Murcia, Spain
关键词
Requirements Engineering; Requirements Metamodelling; Model Driven Engineering; Model Driven Security; REQUIREMENTS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Increasingly, the success of software systems depends largely on how their security requirements are satisfied. However, developers are challenged in implementing these requirements, mainly because of the gap between the specification and implementation, and the technical complexities of the current software infrastructures. Recently, Model-Driven Security has emerged as a new software development area aimed at overcoming these difficulties. This new paradigm takes advantage of the benefits of the model driven software development techniques for modeling and implementing security concerns. Following this trend, this paper proposes a model driven security approach named ModelSec that offers a generative architecture for managing security requirements, from the requirement elicitation to the implementation stage. This architecture automatically generates security software artifacts (e.g. security rules) by means of a model transformation chain composed of two-steps. Firstly, a security infrastructure dependent model is derived from three models, which express the security restrictions, the design decisions and the information needed on the target platform. Then, security software artifacts are produced from the previously generated model. A Domain-Specific Language for security requirements management has been built, which is based on a metamodel specifically designed for this purpose. An application example that illustrates the approach and the Eclipse tools implemented to support it are also shown.
引用
收藏
页码:2957 / 2980
页数:24
相关论文
共 50 条
  • [1] Model-driven architecture based security analysis
    Mili, Saoussen
    Nguyen, Nga
    Chelouah, Rachid
    [J]. SYSTEMS ENGINEERING, 2021, 24 (05) : 307 - 321
  • [2] Model-driven security based on a Web services security architecture
    Nakamura, Y
    Tatsubori, M
    Imamura, T
    Ono, K
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, VOL 1, PROCEEDINGS, 2005, : 7 - 15
  • [3] Enterprise security pattern: A model-driven architecture instance
    Moral-Garcia, Santiago
    Moral-Rubio, Santiago
    Fernandez, Eduardo B.
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 748 - 758
  • [4] Model-Driven Architecture
    Venegas Loor, Leopoldo Vinicio
    [J]. REVISTA SAN GREGORIO, 2014, (08): : 64 - 72
  • [5] Model-Driven Security Smell Resolution in Microservice Architecture Using LEMMA
    Wizenty, Philip
    Ponce, Francisco
    Rademacher, Florian
    Soldani, Jacopo
    Astudillo, Hernan
    Brogi, Antonio
    Sachweh, Sabine
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2023, 2024, 2104 : 29 - 49
  • [6] Advances in Model-Driven Security
    Lucio, Levi
    Zhang, Qin
    Nguyen, Phu H.
    Amrani, Moussa
    Klein, Jacques
    Vangheluwe, Hans
    Le Traon, Yves
    [J]. ADVANCES IN COMPUTERS, VOL 93, 2014, 93 : 103 - 152
  • [7] Model-driven, pattern supported security in service-oriented architecture
    Klarl, Heiko
    [J]. Informatik-Spektrum, 2007, 30 (03) : 175 - 177
  • [8] Model-driven generative development of measurement software
    Martin Monperrus
    Jean-Marc Jézéquel
    Benoit Baudry
    Joël Champeau
    Brigitte Hoeltzener
    [J]. Software & Systems Modeling , 2011, 10 : 537 - 552
  • [9] Model-driven generative development of measurement software
    Monperrus, Martin
    Jezequel, Jean-Marc
    Baudry, Benoit
    Champeau, Joel
    Hoeltzener, Brigitte
    [J]. SOFTWARE AND SYSTEMS MODELING, 2011, 10 (04): : 537 - 552
  • [10] Comparison of model-driven architecture and software factories in the context of Model-Driven Development
    Demir, Ahmet
    [J]. Joint Meeting of the Fourth Workshop on Model-Based Development of Computer-Based Systems and Third International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, Proceedings, 2006, : 75 - 83