A Model-driven Approach for Securing Software Architectures

Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi

2013

Abstract

.

References

  1. 7safe (2010). UK security breach investigations report. Technical report, University of Bedfordshire.
  2. Arrigoni Neri, M., Guarnieri, M., Magri, E., and Mutti, S. (2013). On the Notion of Redundancy in Access Control Policies. In Proc. of SACMAT.
  3. Arrigoni Neri, M., Guarnieri, M., Magri, E., Mutti, S., and Paraboschi, S. (2012). Conflict Detection in Security Policies using Semantic Web Technology. In Proc. of IEEE ESTEL - Security Track.
  4. Basin, D., Clavel, M., and Egea, M. (2011). A decade of model-driven security. In Proc. of SACMAT.
  5. Basin, D., Clavel, M., Egea, M., and Schläpfer, M. (2010). Automatic generation of smart, security-aware GUI models. In Proc. of ESSOS.
  6. Basin, D., Doser, J., and Lodderstedt, T. (2003). Model driven security for process-oriented systems. In Proc. of SACMAT.
  7. Basin, D., Doser, J., and Lodderstedt, T. (2006). Model driven security: From UML models to access control infrastructures. ACM Trans. Soft. Eng. Methodol., 15(1).
  8. Guarnieri, M., Magri, E., and Mutti, S. (2012). Automated management and analysis of security policies using eclipse. In Proc. of the Eclipse-IT 2012.
  9. Jürjens, J. (2003). Secure Systems Development with UML. Springer Berlin / Heidelberg.
  10. Jürjens, J. (2005). Sound methods and effective tools for model-based security engineering with UML. In Proc. of ICSE.
  11. Langevin, J., McCaul, M., Charney, S., and Raduege, H. (2008). Securing cyberspace for the 44th presidency. Technical report, DTIC Document.
  12. Medvidovic, N. (1996). Formal modeling of software architectures at multiple levels of abstraction. In Proc. of the California Software Symposium.
  13. Mouratidis, H., Kolp, M., Faulkner, S., and Giorgini, P. (2005). A secure architectural description language for agent systems. In Proc. of AAMAS. ACM.
  14. Mutti, S., Neri, M. A., and Paraboschi, S. (2011). An eclipse plug-in for specifying security policies in modern information systems. In Proc. of the Eclipse-IT 2011.
  15. Oladimeji, E., Supakkul, S., and Chung, L. (2007). A Model-driven Approach to Architecting Secure Software. In Proc. of SEKE.
  16. Patterson, D. A. (2002). A simple way to estimate the cost of downtime. In Proceedings of LISA, Usenix.
  17. Pertet, S. and Narasimhan, P. (2005). Causes of failures in web applications. CMU Technical Report.
  18. Ren, J. and Taylor, R. N. (2005). A Secure Software Architecture Description Language. In Proc. of SSATTM Workshop.
  19. Robbins, J., Medvidovic, N., Redmiles, D., and Rosenblum, D. (1998). Integrating architecture description languages with a standard design method. In Proc. of ICSE.
  20. Sandhu, R. (1998). Role-based access control. Advances in computers, 46.
  21. Taylor, R., Medvidovic, N., Anderson, K., Whitehead, E.J., J., Robbins, J., Nies, K., Oreizy, P., and Dubrow, D. (1996). A component- and message-based architectural style for GUI software. IEEE Trans. on Soft. Eng., 22(6).
Download


Paper Citation


in Harvard Style

Arrigoni Neri M., Guarnieri M., Magri E., Mutti S. and Paraboschi S. (2013). A Model-driven Approach for Securing Software Architectures . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 595-602. DOI: 10.5220/0004611305950602


in Bibtex Style

@conference{secrypt13,
author={Mario Arrigoni Neri and Marco Guarnieri and Eros Magri and Simone Mutti and Stefano Paraboschi},
title={A Model-driven Approach for Securing Software Architectures},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={595-602},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004611305950602},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - A Model-driven Approach for Securing Software Architectures
SN - 978-989-8565-73-0
AU - Arrigoni Neri M.
AU - Guarnieri M.
AU - Magri E.
AU - Mutti S.
AU - Paraboschi S.
PY - 2013
SP - 595
EP - 602
DO - 10.5220/0004611305950602