Aspect-Oriented Security Hardening of UML Design Models by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu

By Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima

This e-book comprehensively provides a singular method of the systematic safeguard hardening of software program layout versions expressed within the usual UML language. It combines model-driven engineering and the aspect-oriented paradigm to combine safety practices into the early stages of the software program improvement procedure. To this finish, a UML profile has been built for the specification of safety hardening features on UML diagrams. moreover, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of safeguard points into UML models.

The paintings is prepared as follows: bankruptcy 1 provides an creation to software program safety, model-driven engineering, UML and aspect-oriented applied sciences. Chapters 2 and three offer an outline of UML language and the most recommendations of aspect-oriented modeling (AOM) respectively. bankruptcy four explores the realm of model-driven structure with a spotlight on version differences. the most ways which are followed within the literature for defense specification and hardening are provided in bankruptcy five. After those extra normal shows, bankruptcy 6 introduces the AOM profile for protection elements specification. Afterwards, bankruptcy 7 information the layout and the implementation of the safety weaving framework, together with a number of real-life case stories to demonstrate its applicability. bankruptcy eight elaborates an operational semantics for the matching/weaving methods in task diagrams, whereas chapters nine and 10 current a denotational semantics for element matching and weaving in executable versions following a continuation-passing type. eventually, a precis and review of the paintings awarded are supplied in bankruptcy 11.

The ebook will gain researchers in academia and in addition to scholars attracted to studying approximately fresh examine advances within the box of software program safeguard engineering.

Show description

Read Online or Download Aspect-Oriented Security Hardening of UML Design Models PDF

Best security books

Embedded Multimedia Security Systems: Algorithms and Architectures

Establishing with an in depth assessment of present thoughts for selective encryption, this article then examines algorithms that mix either encryption and compression. The publication additionally offers a range of particular examples of the layout and implementation of safe embedded multimedia platforms. beneficial properties: experiences the old advancements and most modern concepts in multimedia compression and encryption; discusses an method of lessen the computational price of multimedia encryption, whereas retaining the homes of compressed video; introduces a polymorphic wavelet structure that could make dynamic source allocation judgements in keeping with the appliance requisites; proposes a lightweight multimedia encryption process in line with a converted discrete wavelet rework; describes a reconfigurable implementation of a chaotic clear out financial institution scheme with superior security measures; provides an encryption scheme for photograph and video information according to chaotic mathematics coding.

Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

Our on-line world defense is a serious topic of our instances. On one hand the advance of net, cellular communications, disbursed computing, software program and databases storing crucial company details has helped to behavior enterprise and private verbal exchange among person humans. nonetheless it has created many possibilities for abuse, fraud and dear harm.

Human Security and Philanthropy: Islamic Perspectives and Muslim Majority Country Practices

Muslims for centuries were taken with philanthropic actions concentrating on terrible and needy humans via assorted forms of ‘third zone’ firms (TSOs). still, many of us in Muslim majority nations (MMCs), no longer having freedom from starvation, face human safeguard crises. now not a lot is understood in regards to the TSOs or their human protection provisions in MMCs.

Pervasive Prevention: A Feminist Reading of the Rise of the Security Society

"The Prevention Society" is a definition that may rather be summarized as: the knowledge society, the chance society, the surveillance society or the insecure society. This publication indicates the connections and variations among those reasons, when delivering a gender analyzing of the ways that social regulate manifests itself via precautionary measures.

Additional resources for Aspect-Oriented Security Hardening of UML Design Models

Example text

Expressions may also have side effects, such as changing the value of an attribute of an object. Alf expressions may be used in any place where a UML value specification may be defined. For example, they may be used as the body of a UML opaque expression or may be compiled into an equivalent UML activity to act as the specification of such an expression. • Statements: A statement is a behavior that is executed for its effect and does not have values. Statements are the primary units of sequencing and control in Alf.

As defined in [63], rule scheduling in transformation languages can be categorized as follows: (1) Implicit scheduling, which is based on the implicit relations between rules, (2) Explicit scheduling, which is based on explicit specification of rule ordering. Additionally, explicit scheduling can be further classified into explicit internal and explicit external scheduling. While the former is defined using explicit rule invocations, the latter depends on defining the scheduling logic outside the transformation rules by the means of some special language.

The result of the transformation along with the PSM is a record of transformation. The record of transformation contains a map from elements of the PIM to the corresponding elements of the PSM. Also, it shows which parts of the mapping were used for each part of the transformation. When referring to model transformations, it is necessary to distinguish between two types of transformations: model-to-model and model-to-code transformation. Moreover, we usually refer to model-to-code transformations as model-to-text since non-code artifacts may be generated, such as XML and documentation [63].

Download PDF sample

Rated 4.69 of 5 – based on 23 votes