語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Aspect-Oriented Security Hardening o...
~
Lima, Vitor.
Aspect-Oriented Security Hardening of UML Design Models
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Aspect-Oriented Security Hardening of UML Design Models/ by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima.
作者:
Mouheb, Djedjiga.
其他作者:
Debbabi, Mourad.
面頁冊數:
XVIII, 237 p. 123 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Software engineering. -
電子資源:
https://doi.org/10.1007/978-3-319-16106-8
ISBN:
9783319161068
Aspect-Oriented Security Hardening of UML Design Models
Mouheb, Djedjiga.
Aspect-Oriented Security Hardening of UML Design Models
[electronic resource] /by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima. - 1st ed. 2015. - XVIII, 237 p. 123 illus.online resource.
1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion.
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.
ISBN: 9783319161068
Standard No.: 10.1007/978-3-319-16106-8doiSubjects--Topical Terms:
562952
Software engineering.
LC Class. No.: QA76.758
Dewey Class. No.: 005.1
Aspect-Oriented Security Hardening of UML Design Models
LDR
:03763nam a22003975i 4500
001
963170
003
DE-He213
005
20200704105204.0
007
cr nn 008mamaa
008
201211s2015 gw | s |||| 0|eng d
020
$a
9783319161068
$9
978-3-319-16106-8
024
7
$a
10.1007/978-3-319-16106-8
$2
doi
035
$a
978-3-319-16106-8
050
4
$a
QA76.758
072
7
$a
UMZ
$2
bicssc
072
7
$a
COM051230
$2
bisacsh
072
7
$a
UMZ
$2
thema
082
0 4
$a
005.1
$2
23
100
1
$a
Mouheb, Djedjiga.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258106
245
1 0
$a
Aspect-Oriented Security Hardening of UML Design Models
$h
[electronic resource] /
$c
by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima.
250
$a
1st ed. 2015.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
XVIII, 237 p. 123 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion.
520
$a
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.
650
0
$a
Software engineering.
$3
562952
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Software Engineering.
$3
669632
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Debbabi, Mourad.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258107
700
1
$a
Pourzandi, Makan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258108
700
1
$a
Wang, Lingyu.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024773
700
1
$a
Nouh, Mariam.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258109
700
1
$a
Ziarati, Raha.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258110
700
1
$a
Alhadidi, Dima.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258111
700
1
$a
Talhi, Chamseddine.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258112
700
1
$a
Lima, Vitor.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1258113
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319161075
776
0 8
$i
Printed edition:
$z
9783319161051
776
0 8
$i
Printed edition:
$z
9783319368948
856
4 0
$u
https://doi.org/10.1007/978-3-319-16106-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入