Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants/ by Sven Matthias Peldszus.
Author:
Peldszus, Sven Matthias.
Description:
XXXVI, 476 p. 138 illus., 80 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-3-658-37665-9
ISBN:
9783658376659
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Peldszus, Sven Matthias.
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
[electronic resource] /by Sven Matthias Peldszus. - 1st ed. 2022. - XXXVI, 476 p. 138 illus., 80 illus. in color.online resource.
Introduction -- Running Example: iTrust -- State of the Art in Secure Software Systems Development -- A Walkthrough of the Proposed Development Approach -- Program Model for Object-oriented Languages -- Model-Synchronization and Tracing -- Application to Legacy Projects using Reverse-Engineering -- Static Security Compliance Checks -- Verification and Enforcement of Security at Run-time -- Specification of Variability throughout Variant-rich Software Systems -- Security in UML Product Lines -- Security Compliance and Restructuring in Variant-rich Software Systems -- The GRaViTY Framework -- Case Studies -- Related Work -- Conclusion.
For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. About the author Since 2016, Sven Matthias Peldszus has been working as a research associate at the University of Koblenz-Landau and joined the Ruhr University Bochum after defending this thesis. His research interests include continuous tracing of non-functional requirements over the entire software life cycle and software quality analysis in variant-rich software systems.
ISBN: 9783658376659
Standard No.: 10.1007/978-3-658-37665-9doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
LDR
:03582nam a22004095i 4500
001
1088586
003
DE-He213
005
20220713150431.0
007
cr nn 008mamaa
008
221228s2022 gw | s |||| 0|eng d
020
$a
9783658376659
$9
978-3-658-37665-9
024
7
$a
10.1007/978-3-658-37665-9
$2
doi
035
$a
978-3-658-37665-9
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Peldszus, Sven Matthias.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1395790
245
1 0
$a
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
$h
[electronic resource] /
$c
by Sven Matthias Peldszus.
250
$a
1st ed. 2022.
264
1
$a
Wiesbaden :
$b
Springer Fachmedien Wiesbaden :
$b
Imprint: Springer Vieweg,
$c
2022.
300
$a
XXXVI, 476 p. 138 illus., 80 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Running Example: iTrust -- State of the Art in Secure Software Systems Development -- A Walkthrough of the Proposed Development Approach -- Program Model for Object-oriented Languages -- Model-Synchronization and Tracing -- Application to Legacy Projects using Reverse-Engineering -- Static Security Compliance Checks -- Verification and Enforcement of Security at Run-time -- Specification of Variability throughout Variant-rich Software Systems -- Security in UML Product Lines -- Security Compliance and Restructuring in Variant-rich Software Systems -- The GRaViTY Framework -- Case Studies -- Related Work -- Conclusion.
520
$a
For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. About the author Since 2016, Sven Matthias Peldszus has been working as a research associate at the University of Koblenz-Landau and joined the Ruhr University Bochum after defending this thesis. His research interests include continuous tracing of non-functional requirements over the entire software life cycle and software quality analysis in variant-rich software systems.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Principles and Models of Security.
$3
1225876
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783658376642
776
0 8
$i
Printed edition:
$z
9783658376666
856
4 0
$u
https://doi.org/10.1007/978-3-658-37665-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login