000 04195nam a22005415i 4500
001 978-3-319-16106-8
003 DE-He213
005 20200421112219.0
007 cr nn 008mamaa
008 150410s2015 gw | s |||| 0|eng d
020 _a9783319161068
_9978-3-319-16106-8
024 7 _a10.1007/978-3-319-16106-8
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
082 0 4 _a005.1
_223
100 1 _aMouheb, Djedjiga.
_eauthor.
245 1 0 _aAspect-Oriented Security Hardening of UML Design Models
_h[electronic resource] /
_cby Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXVIII, 237 p. 123 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion.
520 _aThis book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.
650 0 _aComputer science.
650 0 _aSoftware engineering.
650 0 _aComputer security.
650 1 4 _aComputer Science.
650 2 4 _aSoftware Engineering.
650 2 4 _aSystems and Data Security.
700 1 _aDebbabi, Mourad.
_eauthor.
700 1 _aPourzandi, Makan.
_eauthor.
700 1 _aWang, Lingyu.
_eauthor.
700 1 _aNouh, Mariam.
_eauthor.
700 1 _aZiarati, Raha.
_eauthor.
700 1 _aAlhadidi, Dima.
_eauthor.
700 1 _aTalhi, Chamseddine.
_eauthor.
700 1 _aLima, Vitor.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319161051
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-16106-8
912 _aZDB-2-SCS
942 _cEBK
999 _c57298
_d57298