81,701 Hits in 6.2 sec

Goal Modelling for Security Problem Matching and Pattern Enforcement

Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian-Far
2017 International Journal of Secure Software Engineering  
elementsfromitsconstructs-model-drivenqueriesandtransformations-todescribethepattern enforcement.  ...  This is applied to a number of requirements models within the literature, and the pattern-basedtransformationtooltheydesignedhasautomatedthedetectionandresolutionofthis securitypatterninseveralgoal-orientedstakeholderrequirements.Finally  ...  " button on the product's, InfoSci-Computer Systems and Software Engineering eJournal Collection, InfoSci-Knowledge Discovery,  ... 
doi:10.4018/ijsse.2017070103 fatcat:lgsh255n35boppgwv6fb7fcobq

Enforcing a security pattern in stakeholder goal models

Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, Nobukazu Yoshioka
2008 Proceedings of the 4th ACM workshop on Quality of protection - QoP '08  
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution.  ...  We also implemented in our goal-oriented modeling tool the formally described pattern using model-driven queries and transformations.  ...  Acknowledgements The authors appreciate the support of the Security in Software Engineering project jointly funded by the NII-GRACE center in Japan and the Royal Society in UK.  ... 
doi:10.1145/1456362.1456366 dblp:conf/ccs/YuKWXHY08 fatcat:5tzijfeidbg5llabpho3thishu

A pattern-driven security advisor for service-oriented architectures

Maxim Schnjakin, Michael Menzel, Christoph Meinel
2009 Proceedings of the 2009 ACM workshop on Secure web services - SWS '09  
This security advisor facilitates the configuration of security modules for service-based systems based on a pattern-driven approach that enables the transformation from general security goals to concrete  ...  These specifications are supported by all major Web Service Frameworks and enforced by security modules provided by these frameworks to apply security to ingoing and outgoing messages.  ...  This security patterns define the protocols and appointed conditions to enforce specific security goals.  ... 
doi:10.1145/1655121.1655126 dblp:conf/sws/SchnjakinMM09 fatcat:huav4r3bnfelnnzdhe3kmiskyq

The Security Twin Peaks [chapter]

Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu
2011 Lecture Notes in Computer Science  
This paper provides a practical perspective on this problem by leveraging architectural security patterns.  ...  The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.  ...  This research is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, and by the Research Fund K.U. Leuven.  ... 
doi:10.1007/978-3-642-19125-1_13 fatcat:uk7dfpuxgbblpgxqoitcfees3q

Analyzing and Enforcing Security Mechanisms on Requirements Specifications [chapter]

Tong Li, Jennifer Horkoff, John Mylopoulos
2015 Lecture Notes in Computer Science  
Using the conceptual model, we provide a systematic process for analyzing and enforcing security mechanisms on system requirements.  ...  [Contribution] Based on this study, we propose a conceptual model for security mechanisms, and evaluate this model against 20 security mechanisms.  ...  Acknowledgements This work was supported in part by ERC advanced grant 267856, titled "Lucretius: Foundations for Software Evolution".  ... 
doi:10.1007/978-3-319-16101-3_8 fatcat:hhidiwaaqfdelkcicegfajbumi

Security Requirements Specification in Service-Oriented Business Process Management

Michael Menzel, Ivonne Thomas, Christoph Meinel
2009 2009 International Conference on Availability, Reliability and Security  
For this purpose, we foster a model-driven approach: Information at the modelling layer is gathered and translated to a domain-independent security model.  ...  Concrete protocols and security mechanisms are resolved based on a security pattern system that is introduced in the course of this paper.  ...  These preconditions have to be matched with information provided by our security model to determine appropriate patterns. • solution -A Pattern describes a strategy to solve a problem that is adapted by  ... 
doi:10.1109/ares.2009.90 dblp:conf/IEEEares/MenzelTM09 fatcat:dnkntgycznbpjgfmq4kzqody6i

Scoped Synchronization Constraints for Large Scale Actor Systems [chapter]

Peter Dinges, Gul Agha
2012 Lecture Notes in Computer Science  
Very large scale systems of autonomous concurrent objects (Actors) require coordination models to meet two competing goals.  ...  On the other hand, the coordination models must enforce protocols on potentially uncooperative Actors, while preventing deadlocks caused by malicious or faulty Actors.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1007/978-3-642-30829-1_7 fatcat:3ze5lutp5nfvpcloouycq57wqe

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

Fabio Massacci, Marco Prest, Nicola Zannone
2005 Computer Standards & Interfaces  
Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade.  ...  In this paper we present a comprehensive case study of the application of the Secure Tropos RE methodology for the compliance to the Italian legislation on Privacy and Data Protection by the University  ...  IT security procedures are defined and fit into a structure for security policies and procedures. Responsibilities for IT security are assigned, but not consistently enforced.  ... 
doi:10.1016/j.csi.2005.01.003 fatcat:47mgu6v4zfgzhgfi5lalfxbwce

A Tool for Managing Evolving Security Requirements [chapter]

Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu
2012 Lecture Notes in Business Information Processing  
The tool also supports argumentation analysis to check security properties are preserved by evolution and to identify new security properties that should be taken into account.  ...  The tool supports automatic detection of requirement changes and violation of security properties using change-driven transformations.  ...  Whenever a new match of the security pattern (i.e. a new violation of the security property) emerges in the model, it can be automatically detected and reported.  ... 
doi:10.1007/978-3-642-29749-6_8 fatcat:bc4elvl25zhpvg6hkg4a34aw24

SecKit: A Model-based Security Toolkit for the Internet of Things

Ricardo Neisse, Gary Steri, Igor Nai Fovino, Gianmarco Baldini
2015 Computers & security  
In this paper we propose a Modelbased Security Toolkit, which is integrated in a management framework for IoT devices, and supports specification and efficient evaluation of security policies to enable  ...  Security Management Usage control Internet of Things Policy-based management Trust management a b s t r a c t The control and protection of user data is a very important aspect in the design and deployment  ...  Acknowledgment This work was supported by the EU (grant agreement no. 287708)-funded project Internet Connected Objects for Reconfigurable Ecosystem (iCore).  ... 
doi:10.1016/j.cose.2015.06.002 fatcat:7vy4m5w77ffgxhgsjfsdtfyfem

Semantics-Aware Perimeter Protection [chapter]

Marco Cremonini, Ernesto Damiani, Pierangela Samarati
2004 IFIP International Federation for Information Processing  
Web services security is becoming a critical concern for any organization adopting the XML-based Web services approach to application integration.  ...  While many access control techniques for Web services are becoming available, several issues still need to be solved in order to correctly split the burden of securing Web services between the perimetral  ...  the goal of solving firewall traversal problems caused by the attitude of system administrators, and actually of most network security best practices, of blocking most application protocols at the corporate  ... 
doi:10.1007/1-4020-8070-0_17 fatcat:mfa4likuv5dl5kvtm6n2bgslhy

Implementing database access control policy from unconstrained natural language text

John Slankas
2013 2013 35th International Conference on Software Engineering (ICSE)  
The goal of this research is to improve security and compliance by ensuring access controls rules explicitly and implicitly defined within unconstrained natural language texts are appropriately enforced  ...  to enable the database to enforce access control.  ...  Most especially, I would like to thank my advisor, Laurie Williams, for her guidance and support of my work.  ... 
doi:10.1109/icse.2013.6606716 dblp:conf/icse/Slankas04 fatcat:hswv6nwwvfhmhjs3h5a6swzr3y

Applicability of Neural Networks to Software Security

Adetunji Adebiyi, Johnnes Arreymbi, Chris Imafidon
2012 2012 UKSim 14th International Conference on Computer Modelling and Simulation  
Matching attack patterns to security design patterns. The use of security design pattern to resolve security problems is currently a challenge to software developers.  ...  for matching possible attack patterns .  ...  The guard checks inside the policy whether the context of this user and the rules match and provides or denies access to the resource" Authenticator pattern  Used to perform authentication of a requesting  ... 
doi:10.1109/uksim.2012.14 dblp:conf/uksim/AdebiyiAI12 fatcat:t4bfxvyzcrbodmpzgrqdxffbt4

A Virtualization Assurance Language for Isolation and Deployment

Soren Bleikertz, Thomas Groß
2011 2011 IEEE International Symposium on Policies for Distributed Systems and Networks  
Our policy proposal has a formal foundation, and still allows for efficient specification of a variety of security goals, such as isolation.  ...  This situation calls for automated deployment as well as analysis mechanisms, which in turn require a cloud assurance policy language to express security goals for such environments.  ...  ACKNOWLEDGMENTS We would like to thank Stefan Berger, Dimitrios Pendarakis, Matthias Schunter and Ray Valdez for the interesting discussions on cloud security properties as well as for their valuable comments  ... 
doi:10.1109/policy.2011.10 dblp:conf/policy/BleikertzG11 fatcat:oqbluphzina43mbkcse4ou7udi


Ehab Al-Shaer, Saeed Al-Haj
2010 Proceedings of the 3rd ACM workshop on Assurable and usable security configuration - SafeConfig '10  
FlowChecker encodes FlowTables configuration using Binary Decision Diagrams and then uses the model checker technique to model the inter-connected network of OpenFlow switches.  ...  FlowChecker encodes FlowTables configuration using Binary Decision Diagrams and then uses the model checker technique to model the inter-connected network of OpenFlow switches.  ...  We call this secure slicing. Secure slicing may also be useful for banks as part of defense-in-depth, and for classified and unclassified users sharing the same physical network.  ... 
doi:10.1145/1866898.1866905 dblp:conf/safeconfig/Al-ShaerA10 fatcat:hejxv4cdl5g4bhhm4cwk4m5v2u
« Previous Showing results 1 — 15 out of 81,701 results