期刊文献+

面向用例安全关键系统开发方法研究 被引量:1

ON USE CASE-ORIENTED SECURITY KEY SYSTEM DEVELOPMENT METHOD
下载PDF
导出
摘要 面向用例模型的安全性分析方法是从系统需求文档中提取用例模型,给出其安全性分析规范,并将用例模型集成为合成使用模型。利用umlsec构造型描述安全性,并实现相应的安全性验证工具进行验证,从而避免后期考虑安全性的风险与成本,提高了系统开发的质量和效率。 The use case-oriented security analysis method is to extract the use case model from system requirements document, concluds the security analysis specification, and integrates the use case models into the synthesized use model. In it the :security is described with umlsec, and the verification using corresponding security verifying tool is imlemented. In this way it avoids having to considier the risk and cost of the security in late stage and improves the quality and efficiency of the system development as well.
机构地区 信息工程大学
出处 《计算机应用与软件》 CSCD 北大核心 2013年第8期134-138,共5页 Computer Applications and Software
基金 河南省科技创新杰出青年计划项目(104100510025)
关键词 安全性 用例模型 umlsec Security Use case model umlsec
  • 相关文献

参考文献8

  • 1Rodriguez A,Femandez-Medina E,Piattini M.An MDA Approach toDevelop Secure Business Processes Through a UML 2.0 Extension[J].Computer Systems Science and Engineering,2007,22(5):307-319.
  • 2陈峰,李伟华,房鼎益,陈晓江.集成安全分析的模型驱动软件开发方法研究[J].计算机科学,2009,36(11):165-168. 被引量:2
  • 3袁柯,宋顺林,姜自雷.基于MDA与UML扩展的安全软件开发方法[J].计算机工程,2011,37(15):110-112. 被引量:4
  • 4Muhammad Qaiser Saleem,Jafreezal Jaafar.Model Driven SecurityFramework for Definition of Security Requirements for SOA Based Ap-plications [C].ICCAIE,2010.
  • 5Bjom Regnell,Kristofer Kimbler,Anders Wessl6n.Improving the UseCase Driven Approach to Requirements Engineering[J].IEEE,1995.
  • 6Jan Jurjens,Pasha Shabalin.Automated Verification of UMLsec Modelsfor Security Requirements[J].Computer Science,2004.
  • 7Jan JUrjens.UMLsec:Extending UML for Secure Systems Development[J].Computer Science,2002.
  • 8J' uijens J.Software Architectures for Safe and Secure Systems [C]//5th IEEE/IFIP Conference on Software Architecture(WICSA 2004).IEEE Computer Society,2004.

二级参考文献11

  • 1周新蕾.软件安全性分析技术及应用[J].质量与可靠性,2005(3):37-40. 被引量:10
  • 2Miller J, Mukerji J, et al. Model driven architecture [ EB / OL ]. Ormsc/2001-07-01: Needham, Object Management Group. 2001, 1-31. http: // www. omg. org/cgi-hin/doc? ormsc/2001- 07-01.
  • 3de Miguel M A,Briones J F,Silva J P,et al. Integration of safety analysis in model- driven software development[J], IET Software,2008,2(3) :260-280.
  • 4Jurjens J, Munich T. UMLsec:Presenting the Profile[EB/OL]. http: // www. omg. org/news/meetings/workshops/DOCsec- 2002_Proceedings/01-2_Juergens_UMLsec_Tutorial. pdf.
  • 5Jurjens J, Munich T. Secure Software Architecture Description using UML [EB/OL]. http://wiki.lassy, uni. lu/tiki-download_file. php? fileId=165.
  • 6Best B, Jurjens J, Nuseibeh B. Model- based Security Engineering of Distributed Information Systems using UMLsec[C]// 29th International Conference on Software Engineering (ICSE 2007). Washington: IEEE, 2007 :581-590.
  • 7Rodriguez A, Fernandez-Medina E, Piattini M. An MDA Approach to Develop Secure Business Processes Through a UML 2.0 Extension[J]. Computer Systems, Science and Engineering, 2007, 22(5): 307-319.
  • 8de Miguel M A, Briones J F, Silva J P, et al. Integration of Safety Analysis in Model-driven Software Development[J]. IET Software, 2008, 2(3): 260-280.
  • 9Vela B, Fernandez-Medina E, Marcos E, et al. Model Driven Development of Secure XML Databases[J]. ACM Sigmod Record, 2006, 35(3): 22-27.
  • 10Kleppe A, Warmer J, Bast W. 解析MDA [M]. 鲍志云, 译. 北京: 人民邮电出版社, 2004.

共引文献3

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部