Aspect-Oriented Security Hardening of UML Design Models

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software devel...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Mouheb, Djedjiga (Συγγραφέας), Debbabi, Mourad (Συγγραφέας), Pourzandi, Makan (Συγγραφέας), Wang, Lingyu (Συγγραφέας), Nouh, Mariam (Συγγραφέας), Ziarati, Raha (Συγγραφέας), Alhadidi, Dima (Συγγραφέας), Talhi, Chamseddine (Συγγραφέας), Lima, Vitor (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2015.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04194nam a22005295i 4500
001 978-3-319-16106-8
003 DE-He213
005 20151204151109.0
007 cr nn 008mamaa
008 150410s2015 gw | s |||| 0|eng d
020 |a 9783319161068  |9 978-3-319-16106-8 
024 7 |a 10.1007/978-3-319-16106-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.758 
072 7 |a UMZ  |2 bicssc 
072 7 |a COM051230  |2 bisacsh 
082 0 4 |a 005.1  |2 23 
100 1 |a Mouheb, Djedjiga.  |e author. 
245 1 0 |a Aspect-Oriented Security Hardening of UML Design Models  |h [electronic resource] /  |c by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015. 
300 |a XVIII, 237 p. 123 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a 1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion. 
520 |a This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering. 
650 0 |a Computer science. 
650 0 |a Software engineering. 
650 0 |a Computer security. 
650 1 4 |a Computer Science. 
650 2 4 |a Software Engineering. 
650 2 4 |a Systems and Data Security. 
700 1 |a Debbabi, Mourad.  |e author. 
700 1 |a Pourzandi, Makan.  |e author. 
700 1 |a Wang, Lingyu.  |e author. 
700 1 |a Nouh, Mariam.  |e author. 
700 1 |a Ziarati, Raha.  |e author. 
700 1 |a Alhadidi, Dima.  |e author. 
700 1 |a Talhi, Chamseddine.  |e author. 
700 1 |a Lima, Vitor.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319161051 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-16106-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)