Skip to main content

Model-based Security Engineering with UML

  • Chapter
Secure Systems Development with UML
  • 938 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4.4 Notes

  1. S.H. Houmb and J. Jürjens. Developing secure networked web-based systems using model-based risk assessment and UMLsec. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), page 488ff. IEEE Computer Society, New York, 2003.

    Google Scholar 

  2. J. Jürjens and J. Grünbauer. Critical systems development with UML: Overview with automotive case-study. In 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), pages 512–517. International Association for Computer and Information Science (ACIS), 2003.

    Google Scholar 

  3. J. Jürjens and S.K. Houmb. Risk-driven development of security-critical systems using UMLsec. Kluwer Academic, Dordrecht, 2004. Book chapter to be published (book title pending).

    Google Scholar 

  4. J. Jürjens, G. Popp, and G. Wimmel. Towards using security patterns in model-based system development. In 1th European Conference on Pattern Languages of Programs (EuroPLoP 2002), 2002. Security Focus Group.

    Google Scholar 

  5. J. Jürjens. Developing secure systems with UMLsec — from business processes to implementation. In D. Fox, M. Köhntopp, and A. Pfitzmann, editors, Verläßliche IT-Systeme 2001 (VIS 2001), DuD-Fachbeiträge. Vieweg, Wiesbaden, 2001.

    Google Scholar 

  6. J. Jürjens. Formal development and verification of security-critical systems with UML. In Workshop on Automated Verification of Critical Systems (AVoCS 2001), Oxford, 2001. Published as OUCL Technical Report PRG-RR-01-07. Available at ftp://ftp.comlab.ox.ac.uk/pub/Documents/techreports/RR-01-07.ps.gz.

    Google Scholar 

  7. J. Jürjens. Modelling audit security for smart-card payment schemes with UMLsec. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, pages 93–108. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2001. Proceedings of the 16th International Conference on Information Security (SEC 2001).

    Google Scholar 

  8. J. Jürjens. Secure Java development with UMLsec. In B. De Decker, F. Piessens, J. Smits, and E. Van Herrenweghen, editors, Advances in Network and Distributed Systems Security, pages 107–124. International Federation for Information Processing (IFIP) TC-11 WG 11.4, Kluwer Academic, Dordrecht, 2001. Proceedings of the First Annual Working Conference on Network Security (I-NetSec 2001).

    Google Scholar 

  9. J. Jürjens. Transformations for introducing patterns — a secure systems case study. In Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event), 2001.

    Google Scholar 

  10. J. Jürjens. Formal semantics for interacting UML subsystems. In B. Jacobs and A. Rensink, editors, 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), pages 29–44. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2002.

    Google Scholar 

  11. J. Jürjens. Encapsulating rules of prudent security engineering. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols, volume 2467 of Lecture Notes in Computer Science, pages 95–101. Springer, Berlin Heidelberg New York, 2002. 9th International Workshop. Transcript of discussion on pages 102–106.

    Google Scholar 

  12. J. Jürjens. Methodische Entwicklung sicherer CORBA-Anwendungen. In P. Horster, editor, Enterprise Security. IT-Verlag, Sauerlach, 2002.

    Google Scholar 

  13. J. Jürjens. Secure systems development with UML — applications to telemedicine. In CORAS Public Workshop, 2002. International Conference on Telemedicine (ICT 2002). Invited talk.

    Google Scholar 

  14. J. Jürjens. UMLsec: Extending UML for secure systems development. In H. Hußmann, and S. Cook, editors. 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 2002. Jézéquel et al [JHC02], pages 412–425.

    Google Scholar 

  15. J. Jürjens. Using UMLsec and goal-trees for secure systems development. In H. Haddad, G. Papadopoulos, and B. Panda, editors. Proceedings of the 2002 Symposium of Applied Computing (SAC). ACM Press, 2002. Lamont et al [LHPP02], pages 1026–1031.

    Google Scholar 

  16. J. Jürjens. Developing safety-and security-critical systems with UML. In DARP workshop, 2003. Invited talk.

    Google Scholar 

  17. J. Jürjens. Model-based security with UMLsec. In UML Forum Tokyo, 2003. Invited talk.

    Google Scholar 

  18. J. Jürjens. Developing high-assurance secure systems with UML: An electronic purchase protocol. In Eighth IEEE International Symposium on High Assurance Systems Engineering (RASE 2004), pages 231–240. IEEE Computer Society, New York, 2004.

    Google Scholar 

  19. J. Jürjens. Developing security-critical applications with UMLsec — a short walk-through. Novatica, 168, March/April 2004.

    Google Scholar 

  20. J. Jürjens. Developing Security-Critical Systems with UML, 2004. Series of tutorials at 30 international conferences including OMG DOCsec 2002, IFIP SEC 2002, ETAPS 2003, OMG Workshop On UML for Enterprise Applications 2003, Formal Methods Symposium 2003, ASE 2003, FMOODS 2003, ECOOP 2004, and WCC 2004. Download of material at http://www4.in.tum.de/~juerjens/csdumltut.

    Google Scholar 

  21. J. Jürjens. Foundations for designing secure architectures. In First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, 2004.

    Google Scholar 

  22. J. Jürjens. Logic for security. In Spring School “Logic in Computer Science”, Venezia, 2004. Graduate school on Logic in Informatics, Munich.

    Google Scholar 

  23. J. Jürjens. Security in UML. In4th International School on Foundations of Security Analysis and Design (FOSAD 2004), 2004.

    Google Scholar 

  24. J. Jürjens. Security modeling with UML. Universidad Carlos III de Madrid, 2005.

    Google Scholar 

  25. G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), pages 478–487. IEEE Computer Society, New York, 2003.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(2005). Model-based Security Engineering with UML. In: Secure Systems Development with UML. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-26494-9_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-26494-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00701-2

  • Online ISBN: 978-3-540-26494-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics