By Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima
This publication comprehensively offers a singular method of the systematic protection hardening of software program layout types expressed within the normal UML language. It combines model-driven engineering and the aspect-oriented paradigm to combine protection practices into the early levels of the software program improvement technique. To this finish, a UML profile has been built for the specification of defense hardening points on UML diagrams. additionally, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of safety facets into UML models.
The paintings is geared up as follows: bankruptcy 1 provides an advent to software program safety, model-driven engineering, UML and aspect-oriented applied sciences. Chapters 2 and three offer an summary of UML language and the most ideas of aspect-oriented modeling (AOM) respectively. bankruptcy four explores the realm of model-driven structure with a spotlight on version variations. the most methods which are followed within the literature for defense specification and hardening are provided in bankruptcy five. After those extra normal shows, bankruptcy 6 introduces the AOM profile for safeguard features specification. Afterwards, bankruptcy 7 info the layout and the implementation of the safety weaving framework, together with a number of real-life case reviews to demonstrate its applicability. bankruptcy eight elaborates an operational semantics for the matching/weaving strategies in task diagrams, whereas chapters nine and 10 current a denotational semantics for element matching and weaving in executable types following a continuation-passing variety. eventually, a precis and review of the paintings offered are supplied in bankruptcy 11.
The booklet will gain researchers in academia and in addition to scholars attracted to studying approximately contemporary examine advances within the box of software program defense engineering.
Read or Download Aspect-Oriented Security Hardening of UML Design Models PDF
Similar security books
Within the post-Cold conflict period, ecu militaries are engaged in an ongoing version that is hard kinfolk among defense force and the societies that they serve. This ebook bargains an leading edge conceptual framework to significantly evaluation modern civil-military kinfolk around the continent of Europe.
The globalizing global is more and more confronting a brand new classification of protection concerns with regards to source availability. The source surroundings comprises either conventional different types, comparable to strength, foodstuffs, and water, in addition to new technologically comparable assets, akin to infrequent earth minerals. The essays during this quantity emphasize either the distinctiveness and the value of those new demanding situations, whereas concurrently acknowledging that cooperation and festival in accordance with those safety matters take place in the context of either the old and modern overseas energy configurations.
This selection of essays cuts to the fast of the main urgent ethical matters dealing with decision-makers at the present time, from the activities of normal squaddies in a strive against quarter to presidents finding out whilst and the place to take advantage of strength. • offers transparent, non-partisan, and non-ideological scholarly insurance of historic in addition to modern ethical concerns in overseas affairs• levels subject material from international relations, army decision-making, and overseas legislations to humanitarian intervention and the definition and defense of the fundamental human rights• provides the collective services and multinational views of a world workforce of students• Expands on paintings already good acquired via students, educators, and overseas practitioners in past versions
- Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
- Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings
- A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)
- The Transformation of Security in the Asia/Pacific Region
- Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings
Extra info for Aspect-Oriented Security Hardening of UML Design Models
The proceed form takes as arguments the context exposed by the pointcut of the aroundadvice, and returns whatever the around-advice is declared to return. Accordingly, the around-advice, shown in Fig. 2, doubles the second argument to foo whenever it is called, and then halves its result. Fig. 1 AOP Models 25 Fig. 2 AspectJ around-advice with proceed Matching is the process of selecting the join points that satisfy a given pointcut expression. Whereas, weaving is the process of injecting the advice behaviour specified in the aspect at the identified join points.
The 4 + 1 view model is adopted by many developers and architects because it facilitates the examination of different parts of an architecture, and minimizes the complexity of the overall viewing of a system. Each view in the 4 + 1 view model focuses on certain aspects of the system and intentionally conceals the rest. A general description of each view and the corresponding UML diagrams supported by each view are listed below : • Logical View: Describes the object model of the design, which focuses on the functionality provided to the user by the system.
However, QVT-Core does not have a full implementation and it is not as expressive as QVT-Relations. • QVT-Operational: It is an imperative language that is designed for writing unidirectional transformations. QVT-Relations and QVT-Core languages are good for simple transformations where the source model and the target model have a similar structure. However, when it comes to more sophisticated transformations where elements in the target model are built with no direct correspondence with elements in the source model, declarative languages can be a limitation.
Aspect-Oriented Security Hardening of UML Design Models by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima