Abstract
Nowadays, security has become one of the most mandatory essences in the development and functioning of many software systems. For the reason of complexity of designing secure systems, distinct approaches that allow developers to focus on particular properties of the system of importance for their purpose are proposed. The majority of them are model-oriented since modeling helps show relationships between processes and can be used to predict the effects of changes in the land use. In the article we present and discuss PL/SQL, SecureUML and UMLsec in terms of the Quality of Protection modeling language (QoP-ML). We focus on their capabilities to model relevant information during various phases of security analysis. To assess and compare miscellaneous modeling systems we use a systematic methodology to point out their promiscuous aspects in context of the QoP-ML.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructure. ACM Transactions on Software Engineering and Methodology (TOSEM) 15(1), 39–91 (2006)
Feuerstein, S., Pribly, B.: Oracle PL/SQL Programming, 4th edn. O’Reilly Media Inc. (2005)
Gasevic, D., Djuric, D., Devedzic, V.: Model Driven Engineering and Ontology Development. Springer, Heidelberg (2006)
Jurjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)
Ksiezopolski, B., Kotulski, Z.: On scalable security model for sensor networks protocols. In: 22nd CIB-W78 Conference Information Technology in Construction, Dresden, pp. 463–469 (2005)
Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security 26, 246–255 (2007)
Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems. In: Conference: European Teletraffic Seminar (2011)
Ksiezopolski, B.: QoP-ML: Quality of protection modeling language for cryptographic protocols. Computers & Security 31(4), 569–596 (2012)
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)
Matulevičius, R., Lakk, H., Lepmets, M.: An Approach to Assess and Compare Quality of Security Models. ComSIS 8(2), Special Issue (2011)
Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: On authentication method impact upon data sampling delay in wireless sensor networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol. 79, pp. 280–289. Springer, Heidelberg (2010)
The official web page of the QoP-ML project, http://www.qopml.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mazur, K., Ksiezopolski, B. (2014). Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-44893-9_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44892-2
Online ISBN: 978-3-662-44893-9
eBook Packages: Computer ScienceComputer Science (R0)