Filters








149,831 Hits in 2.9 sec

An approach for modeling and analysis of security system architectures

Yi Deng, Jiacun Wang, J.J.P. Tsai, K. Beznosov
2003 IEEE Transactions on Knowledge and Data Engineering  
The analysis of the architecture is driven by the propagation of the global security constraints onto the components in an incremental process.  ...  We present a methodology for modeling security system architecture and for verifying whether required security constraints are assured by the composition of the components.  ...  This is an important step to assure the security requirements during system design.  ... 
doi:10.1109/tkde.2003.1232267 fatcat:odpsugeiznhohbmcuifhpovtwq

Analyzing security architectures

Marwan Abi-Antoun, Jeffrey M. Barnes
2010 Proceedings of the IEEE/ACM international conference on Automated software engineering - ASE '10  
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation.  ...  We validate the Secoria approach by analyzing a 3,000-line pedagogical Java implementation and a runtime architecture designed by a security expert.  ...  in the built architecture, but not in the designed architecture; • Absence: a node or an edge that is in the designed architecture, but not in the built architecture.  ... 
doi:10.1145/1858996.1859001 dblp:conf/kbse/Abi-AntounB10 fatcat:qa4vh6j6wng65pzpmmvctnawqa

A rigorous methodology for security architecture modeling and verification

Yomna Ali, Sherif El-Kassas
2008 Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW '08  
Security mitigations are expressed as constraints over a high-level SAM model and are used to refine it into a secure constrained model.  ...  This paper introduces a rigorous methodology for utilizing threat modeling in building secure software architectures using SAM (Software Architecture Modeling framework) and verifying them formally using  ...  Introduction There is a lack of a well-defined process for the analysis, architecture and design of secure software systems [1] .  ... 
doi:10.1145/1413140.1413155 fatcat:6mitxpphkrgedhbnkzqbs3swsy

Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems [chapter]

Haralambos Mouratidis, Paolo Giorgini, Gordon Manson
2003 Lecture Notes in Computer Science  
Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system.  ...  The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach  ...  Architectural Design The architectural design phase defines the system's global architecture.  ... 
doi:10.1007/3-540-45017-3_7 fatcat:hqzfwihy4zghbbt5gtq5kxwdby

Mixed Cryptography Constrained Optimization for Heterogeneous, Multicore, and Distributed Embedded Systems

Hyunsuk Nam, Roman Lysecky
2018 Computers  
Security-Driven Optimization Methodology Computers 2018, 7, 29 5 of 22 Computers 2018, 7, x 5 of 21 Energy Constraint 10 J 0.5 J 1 J 0.5 J The size of the design space is a combinatorial function of the  ...  Even further, some research has addressed the design of secure processor architectures, including the use of secure coprocessors for cryptographic operations [6, 20, 21] , and developing secure computing  ...  Lysecky conceived and designed the experiments; H. Nam performed the experiments; H. Nam and R. Lysecky analyzed the data and wrote the paper.  ... 
doi:10.3390/computers7020029 fatcat:ilurzdlcirfvrcrtu6u3saq3lm

A security architecture for electronic commerce applications [chapter]

B. De Win, J. Van den Bergh, F. Matthijs, B. De Decker, W. Joosen
2000 IFIP Advances in Information and Communication Technology  
A major cause of this problem is the variety of technologies used to create such applications. Most existing security architectures are not designed to work in different environments.  ...  This architecture is open enough to be able to cope with the different security and technology requirements oftoday's electronic commerce applications and it is ready for tomorrow's new systems.  ...  Therefor we decided to design a system that would meet all the requirements that were discussed in section 2. Architecture The security architecture presented here is proposed in [3] .  ... 
doi:10.1007/978-0-387-35515-3_50 fatcat:aw54oahadfeshfx7cnsu7ka7iy

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos [chapter]

Michalis Pavlidis, Shareeful Islam, Haralambos Mouratidis
2012 Lecture Notes in Business Information Processing  
The Secure Tropos language uses security concepts such as security constraint, secure goal, secure plan, secure resource, and threat to capture the security concepts from both social and organisational  ...  The tool's architecture, layout, and functionalities are demonstrated through a real world example using the Secure Tropos concepts.  ...  The system goal diagram will be updated automatically in order to include the new security constraint. During the architectural design the architecture of the system is defined.  ... 
doi:10.1007/978-3-642-29749-6_7 fatcat:ze6gsq3dznhfpgq5borjg3u5he

When security meets software engineering: a case of modelling secure information systems

Haralambos Mouratidis, Paolo Giorgini, Gordon Manson
2005 Information Systems  
Architectural Design The architectural design phase defines the system's global architecture.  ...  [8] , an interesting decision that comes up during the architectural design is whether fulfilment of an actor's obligations will be accomplished through assistance from other actors, through delegation  ... 
doi:10.1016/j.is.2004.06.002 fatcat:dp3k4ywacjexvnqklgj3lncj7u

Foundations for Designing Secure Architectures

Jan Jürjens
2006 Electronical Notes in Theoretical Computer Science  
We give an overview over an extension of UML, called UMLsec, that allows expressing security-relevant information within the diagrams in an architectural design specification.  ...  We define foundations for secure architectural design patterns. We present tool-support which has been developed for the UMLsec secure architecture approach.  ...  Secure Foundations for the Java Security Architecture In this section, we explain how to provide foundations for designing secure systems based on the Java Security Architecture.  ... 
doi:10.1016/j.entcs.2005.07.012 fatcat:qupcqfijirhnveoc5am3zduvvu

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study [chapter]

Anas Motii, Agnès Lanusse, Brahim Hamid, Jean-Michel Bruel
2016 Lecture Notes in Computer Science  
Securing critical systems such as cyber physical systems (CPS) is an important feature especially when it comes to critical transmitted data.  ...  Then, the concrete view helps the architect evaluating different possible implementation alternatives against other design constraints.  ...  This work is conducted in the context of a Ph.D. thesis funded by CEA LIST and co-leaded by CEA (LISE) and IRIT (MACAO).  ... 
doi:10.1007/978-3-319-45480-1_30 fatcat:oafwi5t2efedtfej76rreb3egy

Security architecture metamodel for Model Driven security

Makhlouf Derdour, Adel Alti, Mohamed Gasmi, Philippe Roose
2015 Journal of Innovation in Digital Ecosystems  
The design of an architecture meta-model that considers security connectors is required in order to ensure a realistic secure assembly and to address the problems of vulnerability of exchanging data flow  ...  One issue for perpetually designing good and robust architectures is the new security concepts.  ...  The designer can specify security properties which can be an expression which refers to additional constraints and restrictions.  ... 
doi:10.1016/j.jides.2015.12.001 fatcat:rfpxpyppovgkxdaraow6jdw2gm

Cross-Layer Design of Automotive Systems [article]

Zhilu Wang, Hengyi Liang, Chao Huang, Qi Zhu
2020 arXiv   pre-print
The results of these works demonstrate the importance and effectiveness of cross-layer design for automotive systems.  ...  With growing system complexity and closer cyber-physical interaction, there are increasingly stronger dependencies between different function and architecture layers in automotive systems.  ...  Traditionally, the design of different automotive layers is often carried out in an isolated fashion.  ... 
arXiv:2005.11842v2 fatcat:zakiwx4pzfhmph732qcro6f6cq

Architecting secure mobile P2P systems

James Walkerdine, Peter Phillips, Simon Lock
2008 Proceedings of the 1st international workshop on Software architectures and mobility - SAM '08  
This paper presents our work on a tool-supported methodology that aims to assist designers in developing secure mobile P2P systems, specifically encouraging them to consider architectural issues from an  ...  However, the nature of mobile devices brings additional issues that need to be considered during the development process, and in particular when the system architectures are being proposed.  ...  The PDM encourages designers to consider core issues (for example, identifying security concerns, considering mobile technical constraints and making architectural design decisions) from an early stage  ... 
doi:10.1145/1370888.1370892 fatcat:j6f3v43yv5ga5mjkun427didku

Secure Database Development [chapter]

Jan Jurjens, Eduardo B. Fernandez
2014 Encyclopedia of Database Systems  
In particular, it describes how to build a general-purpose database management system where security is an important design parameter.  ...  Synonyms Secure DBMS development, secure database design DEFINITION This entry considers how to build secure database system software.  ...  Designing Secure Databases using OCL An approach to designing the content of a security-critical data base uses the Object Constraint Language (OCL) which is an optional part of the Unified Modeling Language  ... 
doi:10.1007/978-1-4899-7993-3_329-2 fatcat:ybhrxoe46rebxakmfby4xdwwcq

Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems [chapter]

H. Mouratidis, P. Giorgini
2009 Lecture Notes in Computer Science  
a pattern-based approach to transform security requirements to design, and (iii) a security attack scenarios approach to test the developed solution.  ...  The consideration of security requirements in the development of multi-agent systems is a very difficult task.  ...  Selecting the system's architecture according to its security requirements An important requirement of a security-oriented approach is to allow developers to explore different architectural designs or  ... 
doi:10.1007/978-3-642-04879-1_2 fatcat:olerr4uqrbafbl4m457irwtz7a
« Previous Showing results 1 — 15 out of 149,831 results